π Microsoft will pay hackers up to $30K to find flaws in the new Edge browser π
π Read
via "Security on TechRepublic".
The Microsoft Edge browser was released in beta, and the tech giant is running a bug bounty program for researchers to find major vulnerabilities.π Read
via "Security on TechRepublic".
π How to secure and protect your Microsoft Account π
π Read
via "Security on TechRepublic".
Follow these steps to make sure your Microsoft Account is safe and protected.π Read
via "Security on TechRepublic".
β HOAX ALERT! Facebook βdeadlineβ on making your content public is fake β
π Read
via "Naked Security".
There's no privacy Armageddon coming βTOMORROW!β If there was, you couldn't copy and paste your way out of it!π Read
via "Naked Security".
Naked Security
HOAX ALERT! Facebook βdeadlineβ on making your content public is fake
Thereβs no privacy Armageddon coming βTOMORROW!β If there was, you couldnβt copy and paste your way out of it!
β Adult Content Site Exposed Personal Data of 1M Users β
π Read
via "Threatpost".
The personal email addresses - some indicating user names or government official status - of more than a million pornography website users were exposed.π Read
via "Threatpost".
Threat Post
Adult Content Site Exposed Personal Data of 1M Users
The personal email addresses - some indicating user names or government official status - of more than a million pornography website users were exposed.
π΄ 'Phoning Home': Your Latest Data Exfiltration Headache π΄
π Read
via "Dark Reading: ".
Companies phone enterprise customer data home securely and for a variety of perfectly legitimate and useful reasons. The problems stem from insufficient disclosure.π Read
via "Dark Reading: ".
Dark Reading
'Phoning Home': Your Latest Data Exfiltration Headache
Companies phone enterprise customer data home securely and for a variety of perfectly legitimate and useful reasons. The problems stem from insufficient disclosure.
β Webcam woes β worldβs oldest online camera struggles with security β
π Read
via "Naked Security".
Webcams are older than you think - but the oldest one still running won't be around much longer.π Read
via "Naked Security".
Naked Security
Webcam woes β worldβs oldest online camera struggles with security
Webcams are older than you think β but the oldest one still running wonβt be around much longer.
ATENTIONβΌ New - CVE-2015-9321
π Read
via "National Vulnerability Database".
The shortcode-factory plugin before 1.1.1 for WordPress has XSS via add_query_arg.π Read
via "National Vulnerability Database".
π How CISOs can better defend their organizations against cyberthreats π
π Read
via "Security on TechRepublic".
More chief information security officers are modifying their security strategy from one of prevention to one of detection and response, according to a Forbes Insights report released Wednesday.π Read
via "Security on TechRepublic".
TechRepublic
How CISOs can better defend their organizations against cyberthreats
More chief information security officers are modifying their security strategy from one of prevention to one of detection and response, according to a Forbes Insights report released Wednesday.
β Backdoor Found in Utility for Linux, Unix Servers β
π Read
via "Threatpost".
Backdoor was intentionally planted in 2018 and found during the DEF CON 2019 security conference when researchers stumbled upon malicious code.π Read
via "Threatpost".
Threat Post
Backdoor Found in Utility for Linux, Unix Servers
Backdoor was intentionally planted in 2018 and found during the DEF CON 2019 security conference when researchers stumbled upon malicious code.
π΄ Bad Actors Find Leverage With Automated Active Attacks π΄
π Read
via "Dark Reading: ".
Once used only by nation-state attackers, automated active attacks have gone mainstream and allow the average cyber-criminal to gain entry and engage in malfeasance, says Chet Wisniewski, Principal Research scientist with Sophos. Luckily, organizations are getting smarter at spotting these stealthy, customized attacks earlier than they used to.π Read
via "Dark Reading: ".
Dark Reading
Bad Actors Find Leverage With Automated Active Attacks - Dark Reading
Once used only by nation-state attackers, automated active attacks have gone mainstream and allow the average cyber-criminal to gain entry and engage in malfeasance, says Chet Wisniewski, Principal Research scientist with Sophos. Luckily, organizations areβ¦
π΄ New Confidential Computing Consortium Includes Google, Intel, Microsoft π΄
π Read
via "Dark Reading: ".
The Linux Foundation plans to form a community to "define and accelerate" the adoption of confidential computing.π Read
via "Dark Reading: ".
Darkreading
New Confidential Computing Consortium Includes Google, Intel, Microsoft
The Linux Foundation plans to form a community to "define and accelerate" the adoption of confidential computing.
π΄ State-Sponsored Cyberattacks Target Medical Research π΄
π Read
via "Dark Reading: ".
Cancer research is a particular target among Chinese espionage groups, says security firm FireEye.π Read
via "Dark Reading: ".
Darkreading
State-Sponsored Cyberattacks Target Medical Research
Cancer research is a particular target among Chinese espionage groups, says security firm FireEye.
β Cisco Patches Six Critical Bugs in UCS Gear and Switches β
π Read
via "Threatpost".
Six bugs found in Ciscoβs Unified Computing System gear and its 220 Series Smart switches can allow unauthenticated remote hackers to take over equipment.π Read
via "Threatpost".
Threat Post
Cisco Patches Six Critical Bugs in UCS Gear and Switches
Six bugs found in Ciscoβs Unified Computing System gear and its 220 Series Smart switches can allow unauthenticated remote hackers to take over equipment.
π΄ Ransomware Hits Fortnite Players π΄
π Read
via "Dark Reading: ".
Ransomware masquerading as game "cheats" is hitting Fortnite players. Fortunately, there are ways to recover without paying a ransom.π Read
via "Dark Reading: ".
Dark Reading
Ransomware Hits Fortnite Players
Ransomware masquerading as game cheats is hitting Fortnite players. Fortunately, there are ways to recover without paying a ransom.
π Healthcare Orgs in New York Need to Follow a New Protocol Following a Cybersecurity Incident π
π Read
via "Subscriber Blog RSS Feed ".
Healthcare organizations in New York need to be aware of a newly implemented protocol, effective immediately, when it comes to reporting a potential cybersecurity incident to the New York Department of Health.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Healthcare Orgs in New York Need to Follow a New Protocol Following a Cybersecurity Incident
Healthcare organizations in New York need to be aware of a newly implemented protocol, effective immediately, when it comes to reporting a potential cybersecurity incident to the New York Department of Health.
β The Texas Ransomware Attacks: A Gamechanger for Cybercriminals β
π Read
via "Threatpost".
Security researchers worry that this weekend's coordinated attacks on more than 20 Texas governments mark a change in how ransomware attacks will be launched in the future.π Read
via "Threatpost".
Threat Post
The Texas Ransomware Attacks: A Gamechanger for Cybercriminals
Security researchers worry that this weekend's coordinated attacks on more than 20 Texas governments mark a change in how ransomware attacks will be launched in the future.
π΄ 'Box Shield' Brings New Security Controls π΄
π Read
via "Dark Reading: ".
New controls and threat detection capabilities built into Box aim to prevent accidental data leakage and misuse.π Read
via "Dark Reading: ".
Dark Reading
'Box Shield' Brings New Security Controls
New controls and threat detection capabilities built into Box aim to prevent accidental data leakage and misuse.
π΄ eSentire Blends Managed Detection Response With Machine Learning π΄
π Read
via "Dark Reading: ".
While many infosec pros believe they're getting managed detection response (MDR) from their managed security service providers, that's not necessarily the case, according to Eldon Sprickerhoff, Founder and Chief Innovation Officer of eSentire. Adding machine learning to the mix helps automate MDR, strengthening an organization's security posture.π Read
via "Dark Reading: ".
Dark Reading
eSentire Blends Managed Detection Response With Machine Learning - Dark Reading
While many infosec pros believe they're getting managed detection response (MDR) from their managed security service providers, that's not necessarily the case, according to Eldon Sprickerhoff, Founder and Chief Innovation Officer of eSentire. Adding machineβ¦
ATENTIONβΌ New - CVE-2014-10380
π Read
via "National Vulnerability Database".
The profile-builder plugin before 1.1.66 for WordPress has multiple XSS issues in forms.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2014-10379
π Read
via "National Vulnerability Database".
The duplicate-post plugin before 2.6 for WordPress has SQL injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2014-10378
π Read
via "National Vulnerability Database".
The duplicate-post plugin before 2.6 for WordPress has XSS.π Read
via "National Vulnerability Database".