β News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware β
π Read
via "Threatpost".
The malware landscape continues to evolve with the re-emergence of the GandCrab operators and a continued spearphishing attack spreading the LookBack RAT.π Read
via "Threatpost".
Threat Post
News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware
The malware landscape continues to evolve with the re-emergence of the GandCrab operators and a continued spearphishing attack spreading the LookBack RAT.
β Google made thousands of deepfakes to aid detection efforts β
π Read
via "Naked Security".
It's an arms race: as detection methods improve, deepfake-generating algorithms are quickly updated to correct the flaws.π Read
via "Naked Security".
Naked Security
Google made thousands of deepfakes to aid detection efforts
Itβs an arms race: as detection methods improve, deepfake-generating algorithms are quickly updated to correct the flaws.
β Chrome cripples movie studio Mac Pros β
π Read
via "Naked Security".
A few days ago, movie editors started reporting that Mac Pros running Avid software were crashing throughout Hollywood.π Read
via "Naked Security".
Naked Security
Chrome cripples movie studio Mac Pros
A few days ago, movie editors started reporting that Mac Pros running Avid software were crashing throughout Hollywood.
π Hybrid cloud setup offers relief to some companies while others are still fearful π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby discusses the findings of a recent FileCloud study concerning enterprise cloud and data issues.π Read
via "Security on TechRepublic".
TechRepublic
Hybrid cloud setup offers relief to some companies while others are still fearful
TechRepublic's Karen Roby discusses the findings of a recent FileCloud study concerning enterprise cloud and data issues.
β Apple users, patch now! The βbug that got awayβ has been fixed β
π Read
via "Naked Security".
Apple has now patched the patch that Google said didn't patch the hole it was supposed to.π Read
via "Naked Security".
Naked Security
Apple users, patch now! The βbug that got awayβ has been fixed
Apple has now patched the patch that Google said didnβt patch the hole it was supposed to.
β βFleecewareβ Play store apps quietly charging up to $250 β
π Read
via "Naked Security".
SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under the Google's nose.π Read
via "Naked Security".
Naked Security
βFleecewareβ Play store apps quietly charging up to $250
SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under Googleβs nose.
π΄ Is Your Organization Suffering from Security Tool Sprawl? π΄
π Read
via "Dark Reading: ".
Most companies have too many tools, causing increased costs and security issues.π Read
via "Dark Reading: ".
Dark Reading
Is Your Organization Suffering from Security Tool Sprawl?
Most companies have too many tools, causing increased costs and security issues.
ATENTIONβΌ New - CVE-2014-10396 (epic)
π Read
via "National Vulnerability Database".
The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.π Read
via "National Vulnerability Database".
π΄ DoorDash Breach Affects 4.9M Merchants, Customers, Workers π΄
π Read
via "Dark Reading: ".
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.π Read
via "Dark Reading: ".
Darkreading
DoorDash Breach Affects 4.9M Merchants, Customers, Workers
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
β Microsoft Blacklists Dozens of New File Extensions in Outlook β
π Read
via "Threatpost".
In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.π Read
via "Threatpost".
Threat Post
Microsoft Blacklists Dozens of New File Extensions in Outlook
In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.
β Arcane Stealer V Takes Aim at the Low End of the Dark Web β
π Read
via "Threatpost".
This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.π Read
via "Threatpost".
Threat Post
Arcane Stealer V Takes Aim at the Low End of the Dark Web
This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.
β Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack β
π Read
via "Threatpost".
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.π Read
via "Threatpost".
Threat Post
Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.
π Friday Five: 9/27 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 9/27 Edition
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!
π΄ Cybersecurity Certification in the Spotlight Again π΄
π Read
via "Dark Reading: ".
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
β Masad Spyware Uses Telegram Bots for Command-and-Control β
π Read
via "Threatpost".
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.π Read
via "Threatpost".
Threat Post
Masad Spyware Uses Telegram Bots for Command-and-Control
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.
π΄ Apple Patches Multiple Vulnerabilities Across Platforms π΄
π Read
via "Dark Reading: ".
Updates address two separate issues in Apple's desktop and mobile operating systems.π Read
via "Dark Reading: ".
Dark Reading
Apple Patches Multiple Vulnerabilities Across Platforms
Updates address two separate issues in Apple's desktop and mobile operating systems.
β iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks β
π Read
via "Threatpost".
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.π Read
via "Threatpost".
Threat Post
iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.
π΄ Cloud Vulnerability Could Let One Server Compromise Thousands π΄
π Read
via "Dark Reading: ".
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.π Read
via "Dark Reading: ".
Dark Reading
Cloud Vulnerability Could Let One Server Compromise Thousands
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.