π΄ Malware Linked to Ryuk Targets Financial & Military Data π΄
π Read
via "Dark Reading: ".
A newly discovered campaign, packing traces of Ryuk ransomware, aims to steal confidential information.π Read
via "Dark Reading: ".
Darkreading
Malware Linked to Ryuk Targets Financial & Military Data
A newly discovered campaign, packing traces of Ryuk ransomware, aims to steal confidential information.
β WordPress XSS Bug Allows Drive-By Code Execution β
π Read
via "Threatpost".
Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.π Read
via "Threatpost".
Threat Post
WordPress XSS Bug Allows Drive-By Code Execution
Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From Intel's SSH-stealing NetCAT bug to Mozilla's VPN - and everything in between. It's the weekly roundup.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From Intelβs SSH-stealing NetCAT bug to Mozillaβs VPN β and everything in between. Itβs the weekly roundup.
π΅ Beyond malware: Why itβs time to take the fileless threat seriously π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
Why itβs Time to Take the Fileless Threats Seriously | VPNpro
Cybersecurity expert Phil Muncaster discusses so-called βfilelessβ malware and ways to protect your business against this new type of digital threats.
β Tiny Pacific nation forges ahead with national cryptocurrency β
π Read
via "Naked Security".
The Marshall Islands is facing rising seas and financial isolation. But critics say their get-rich-quick cryptocurrency scheme won't work.π Read
via "Naked Security".
Naked Security
Tiny Pacific nation forges ahead with national cryptocurrency
The Marshall Islands is facing rising seas and financial isolation. But critics say their get-rich-quick cryptocurrency scheme wonβt work.
β Simjacker silent phone hack could affect a billion users β
π Read
via "Naked Security".
The shadowy world of phone-surveillance-for-hire became a little clearer last week following the discovery of a phone exploit called Simjacker.π Read
via "Naked Security".
Naked Security
Simjacker silent phone hack could affect a billion users
The shadowy world of phone-surveillance-for-hire became a little clearer last week following the discovery of a phone exploit called Simjacker.
β Google fixes Chromebook 2FA flaw in βbuilt-in security keyβ β
π Read
via "Naked Security".
Google has discovered a flaw in a Chromebook security feature which allows owners to press their deviceβs power button to initiate U2F 2FA.π Read
via "Naked Security".
Naked Security
Google fixes Chromebook 2FA flaw in βbuilt-in security keyβ
Google has discovered a flaw in a Chromebook security feature which allows owners to press their deviceβs power button to initiate U2F 2FA.
β iPhone lockscreen bypass: iOS 13 tricked into showing your contacts β
π Read
via "Naked Security".
This time, JosΓ© RodrΓguez came up with a way to trick the iOS 13 beta into showing its address book without the need to unlock the screen.π Read
via "Naked Security".
Naked Security
iPhone lockscreen bypass: iOS 13 tricked into showing your contacts
This time, JosΓ© RodrΓguez came up with a way to trick the iOS 13 beta into showing its address book without the need to unlock the screen.
β New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware β
π Read
via "Threatpost".
ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.π Read
via "Threatpost".
Threat Post
New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware
ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.
π΄ Preventing PTSD and Burnout for Cybersecurity Professionals π΄
π Read
via "Dark Reading: ".
The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.π Read
via "Dark Reading: ".
Dark Reading
Preventing PTSD and Burnout for Cybersecurity Professionals
The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.
π΄ US Sanctions 3 Cyber Attack Groups Tied to DPRK π΄
π Read
via "Dark Reading: ".
Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2016-10966
π Read
via "National Vulnerability Database".
The real3d-flipbook-lite plugin 1.0 for WordPress has bookName=../ directory traversal for file upload.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10965
π Read
via "National Vulnerability Database".
The real3d-flipbook-lite plugin 1.0 for WordPress has deleteBook=../ directory traversal for file deletion.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10964
π Read
via "National Vulnerability Database".
The dwnldr plugin before 1.01 for WordPress has XSS via the User-Agent HTTP header.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10963
π Read
via "National Vulnerability Database".
The icegram plugin before 1.9.19 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10962
π Read
via "National Vulnerability Database".
The icegram plugin before 1.9.19 for WordPress has CSRF via the wp-admin/edit.php option_name parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10961
π Read
via "National Vulnerability Database".
The colorway theme before 3.4.2 for WordPress has XSS via the contactName parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10960
π Read
via "National Vulnerability Database".
The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10959
π Read
via "National Vulnerability Database".
The estatik plugin before 2.3.1 for WordPress has authenticated arbitrary file upload (exploitable with CSRF) via es_media_images[] to wp-admin/admin-ajax.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10958
π Read
via "National Vulnerability Database".
The estatik plugin before 2.3.0 for WordPress has unauthenticated arbitrary file upload via es_media_images[] to wp-admin/admin-ajax.php.π Read
via "National Vulnerability Database".