π΄ Cybercriminal's Black Market Pricing Guide π΄
π Read
via "Dark Reading: ".
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.π Read
via "Dark Reading: ".
Dark Reading
Cybercriminal's Black Market Pricing Guide
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.
π How to protect yourself against web miners π
π Read
via "Security on TechRepublic".
While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.π Read
via "Security on TechRepublic".
TechRepublic
How to protect yourself against web miners
While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.
π DNS amplification attacks increase by 1,000% since 2018 π
π Read
via "Security on TechRepublic".
Researchers said a new defense system is fueling a wave of DNS amplification attacks.π Read
via "Security on TechRepublic".
TechRepublic
DNS amplification attacks increase by 1,000% since 2018
Researchers said a new defense system is fueling a wave of DNS amplification attacks.
π΄ Five Common Cloud Configuration Mistakes π΄
π Read
via "Dark Reading: ".
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.π Read
via "Dark Reading: ".
Dark Reading
Five Common Cloud Configuration Mistakes
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
π Australian not-for-profit's encryption solution to privacy breaches π
π Read
via "Security on TechRepublic".
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.π Read
via "Security on TechRepublic".
TechRepublic
Australian not-for-profit's encryption solution to privacy breaches
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.
π΄ Snowden Sued by US Government Over His New Book π΄
π Read
via "Dark Reading: ".
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.π Read
via "Dark Reading: ".
Dark Reading
Snowden Sued by US Government Over His New Book
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
π Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case π
π Read
via "Subscriber Blog RSS Feed ".
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.
π΄ Any Advice for Assessing Third-Party Risk? π΄
π Read
via "Dark Reading: ".
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.π Read
via "Dark Reading: ".
Dark Reading
Any Advice for Assessing Third-Party Risk?
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
β Panda Threat Group Mines for Monero With Updated Payload, Targets β
π Read
via "Threatpost".
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.π Read
via "Threatpost".
Threat Post
Panda Threat Group Mines for Monero With Updated Payload, Targets
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.
π΄ MITRE Releases 2019 List of Top 25 Software Weaknesses π΄
π Read
via "Dark Reading: ".
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
π΄ Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done' π΄
π Read
via "Dark Reading: ".
Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say.π Read
via "Dark Reading: ".
Dark Reading
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
β Teenage gamer jailed over lethal swatting β
π Read
via "Naked Security".
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.π Read
via "Naked Security".
Naked Security
Teenage gamer jailed over lethal swatting
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.
β Common storage and router devices are still hopelessly broken β
π Read
via "Naked Security".
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device - the chances are that itβs no more secure than its predecessors.π Read
via "Naked Security".
Naked Security
Common storage and router devices are still hopelessly broken
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device β the chances are that itβs no more secure than its predecessors.
β Leaky database spills data on 20 million Ecuadorians and businesses β
π Read
via "Naked Security".
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.π Read
via "Naked Security".
Naked Security
Leaky database spills data on 20 million Ecuadorians and businesses
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.
β Is $100 million enough to save the web from ads? β
π Read
via "Naked Security".
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.π Read
via "Naked Security".
Naked Security
Is $100 million enough to save the web from ads?
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.
β WannaCry β the worm that just wonβt die β
π Read
via "Naked Security".
WannaCry never went away - it just became less obvious.π Read
via "Naked Security".
Naked Security
WannaCry β the worm that just wonβt die
WannaCry never went away β it just became less obvious.
β Malware Moves: The Rise of LookBack β And Return of Emotet β
π Read
via "Threatpost".
The malware landscape is constantly changing; including a rise in a new malware called LookBack, as well as anticipation over the return of the Emotet and Retefe malware families.π Read
via "Threatpost".
Threat Post
Malware Moves: The Rise of LookBack β And Return of Emotet
Researchers believe that nation-state actors are behind several spearphishing campaigns targeting U.S. utility companies with a newly-identified malware called LookBack, which has the capabilities to view system data and reboot machines. Meanwhile, otherβ¦
β Massive Gaming DDoS Exploits Widespread Technology β
π Read
via "Threatpost".
The attack -- the 4th-largest the company has ever encountered -- leveraged WS-Discovery, the same exploit used in the 2016 Dyn incident.π Read
via "Threatpost".
Threat Post
Massive Gaming DDoS Exploits Widespread Technology
The attack β the 4th-largest the company has ever encountered β leveraged WS-Discovery, which is found "everywhere."