ATENTIONβΌ New - CVE-2015-9411
π Read
via "National Vulnerability Database".
The Postmatic plugin before 1.4.6 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9411
π Read
via "National Vulnerability Database".
The Postmatic plugin before 1.4.6 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9410
π Read
via "National Vulnerability Database".
The Blubrry PowerPress Podcasting plugin 6.0.4 for WordPress has XSS via the tab parameter.π Read
via "National Vulnerability Database".
β Vimeo sued for storing faceprints of people without their say-so β
π Read
via "Naked Security".
The suit was filed under BIPA, the Illinois law that requires written consent to grab people's faceprints - the same law Facebook's battling.π Read
via "Naked Security".
Naked Security
Vimeo sued for storing faceprints of people without their say-so
The suit was filed under BIPA, the Illinois law that requires written consent to grab peopleβs faceprints β the same law Facebookβs battling.
β Update ColdFusion now! Emergency patch for critical flaws β
π Read
via "Naked Security".
Adobe has rushed out fixes for three vulnerabilities in its ColdFusion web development platform, two of which have been given the top billing of βcriticalβ.π Read
via "Naked Security".
Naked Security
Update ColdFusion now! Emergency patch for critical flaws
Adobe has rushed out fixes for three vulnerabilities in its ColdFusion web development platform, two of which have been given the top billing of βcriticalβ.
β Russian pleads guilty in massive JPMorgan hacking scheme β
π Read
via "Naked Security".
Andrei Tyurin is the first to be convicted in one of the largest thefts of customer data from a single US financial institution in history.π Read
via "Naked Security".
Naked Security
Russian pleads guilty in massive JPMorgan hacking scheme
Andrei Tyurin is the first to be convicted in one of the largest thefts of customer data from a single US financial institution in history.
β Hackers are infecting WordPress sites via a defunct plug-in β
π Read
via "Naked Security".
If you're a Wordpress admin using a plug-in called Rich Reviews, you'll want to uninstall it. Now. The now-defunct plug-in has a major vulnerability that allows malvertisers to infect sites running Wordpress and redirect visitors to other sites.π Read
via "Naked Security".
Naked Security
Hackers are infecting WordPress sites via a defunct plug-in
If youβre a Wordpress admin using a plug-in called Rich Reviews, youβll want to uninstall it. Now.
β Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems β
π Read
via "Threatpost".
Users scrambled to find a fix for the problem and eventually Google took responsibility for the issue.π Read
via "Threatpost".
Threat Post
Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems
Users scrambled to find a fix for the problem and eventually Google took responsibility for the issue.
β Cyber-Risk Business Cases: Using Economic Impact to Justify TIG Investment β
π Read
via "Threatpost".
How to determine -- and communicate -- the value of Threat Intelligence Gateways (TIGs) in your enterprise.π Read
via "Threatpost".
Threat Post
Cyber-Risk Business Cases: Using Economic Impact to Justify TIG Investment
How to determine β and communicate β the value of Threat Intelligence Gateways (TIGs) in your enterprise.
π Why businesses would rather lose revenue than data π
π Read
via "Security on TechRepublic".
While businesses don't want to lose data, 66% of business decision makers said their current IT resources do not keep up with growing technological demands.π Read
via "Security on TechRepublic".
TechRepublic
Why businesses would rather lose revenue than data
While businesses don't want to lose data, 66% of business decision makers said their current IT resources do not keep up with growing technological demands.
β S2 Ep10: Emotetβs back, mutant WannaCry and Insta scam β Naked Security Podcast β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - listen now!π Read
via "Naked Security".
Naked Security
S2 Ep10: Emotetβs back, mutant WannaCry and Insta scam β Naked Security Podcast
Hereβs the latest Naked Security podcast β listen now!
β CISOs: Support Vendor Security Ops for Best Cloud Results β
π Read
via "Threatpost".
Despite CISOs' apprehension about increasing dependence on SaaS applications and the security risks the cloud represents, adoption isnβt slowing down.π Read
via "Threatpost".
Threat Post
CISOs: Support Vendor Security Ops for Best Cloud Results
CISOs' apprehension about increasing dependence on SaaS applications and the security risks the cloud represents isnβt slowing down cloud adoption.
π 75% of execs cite phishing as the most significant security threat to businesses π
π Read
via "Security on TechRepublic".
Training is the key to helping the enterprise avoid cyber threats from phishing or other means.π Read
via "Security on TechRepublic".
TechRepublic
75% of execs cite phishing as the most significant security threat to businesses
Training is the key to helping the enterprise avoid cyber threats from phishing or other means.
π΄ Why You Need to Think About API Security π΄
π Read
via "Dark Reading: ".
Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.π Read
via "Dark Reading: ".
Darkreading
Why You Need to Think About API Security
Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.
β Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy β
π Read
via "Threatpost".
Vimeo is under fire for allegedly collecting and storing users' facial biometrics in videos and photos without their consent or knowledge.π Read
via "Threatpost".
Threat Post
Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy
Vimeo is under fire for allegedly collecting and storing users' facial biometrics in videos and photos without their consent or knowledge.
β Phish Uses Googleβs URL Decoding to Swim Past Defenses β
π Read
via "Threatpost".
Percentage-based URL encoding plus Google domain trickery is helping malicious emails to evade filters.π Read
via "Threatpost".
Threat Post
Phish Uses Googleβs URL Decoding to Swim Past Defenses
Percentage-based URL encoding plus Google domain trickery is helping malicious emails to evade filters.
β Cisco Patches 13 High-Severity Router and Switch Bugs β
π Read
via "Threatpost".
One Cisco bug impacting its 800 and 1000 series routers had a CVSS severity score of 9.9.π Read
via "Threatpost".
Threat Post
Cisco Patches 13 High-Severity Router and Switch Bugs
One Cisco bug impacting its 800 and 1000 series routers had a CVSS severity score of 9.9.
β 5G and IoT: How to Approach the Security Implications β
π Read
via "Threatpost".
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).π Read
via "Threatpost".
Threat Post
5G and IoT: How to Approach the Security Implications
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).
π Falco 0.17.1 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.17.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π EU Court Limits 'Right to Be Forgotten' π
π Read
via "Subscriber Blog RSS Feed ".
Google won what many viewed as a milestone case this week as Europe's top court ruled it doesn't have to extend the "right to be forgotten" privacy rule beyond the EUβs 28 states.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
EU Court Limits 'Right to Be Forgotten'
Google won what many viewed as a milestone case this week as Europe's top court ruled it doesn't have to extend the "right to be forgotten" privacy rule beyond the EUβs 28 states.
β Rash of Exploits Targets Critical vBulletin RCE Bug β
π Read
via "Threatpost".
After someone dropped a zero-day exploit on Securelist this week, the platform rushed out a fix -- time to apply it.π Read
via "Threatpost".
Threat Post
Rash of Exploits Targets Critical vBulletin RCE Bug
After someone dropped a zero-day exploit on Securelist this week, the platform rushed out a fix β time to apply it.