π΄ Android 0-Day Seen Exploited in the Wild π΄
π Read
via "Dark Reading: ".
The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.π Read
via "Dark Reading: ".
Darkreading
Android 0-Day Seen Exploited in the Wild
The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.
β Google Warns of Android Zero-Day Bug Under Active Attack β
π Read
via "Threatpost".
Flaw impacts 18 Android models including Googleβs flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.π Read
via "Threatpost".
Threat Post
Google Warns of Android Zero-Day Bug Under Active Attack
Flaw impacts 18 Android models including Googleβs flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.
π Friday Five: 10/4 Edition π
π Read
via "Subscriber Blog RSS Feed ".
News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 10/4 Edition
News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.
ATENTIONβΌ New - CVE-2018-11768
π Read
via "National Vulnerability Database".
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.π Read
via "National Vulnerability Database".
π΄ FBI Investigates Mobile Voting Intrusion π΄
π Read
via "Dark Reading: ".
A group tried to access West Virginia's mobile voting app in 2018; now, the FBI is looking into what actually happened.π Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
π΄ Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage' π΄
π Read
via "Dark Reading: ".
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?π Read
via "Dark Reading: ".
Dark Reading
Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?
π΄ Iran Caught Targeting US Presidential Campaign Accounts π΄
π Read
via "Dark Reading: ".
Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.π Read
via "Dark Reading: ".
Darkreading
Iran Caught Targeting US Presidential Campaign Accounts
Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.
π WhatWeb Scanner 0.5.0 π
π Go!
via "Security Tool Files β Packet Storm".
WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
WhatWeb Scanner 0.5.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Zeek 3.0.0 (Formerly Known As Bro) π
π Go!
via "Security Tool Files β Packet Storm".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Zeek 3.0.0 (Formerly Known As Bro) β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Monday review β the hot 22 stories of the week β
π Read
via "Naked Security".
From the hacker's folks who whisked away his stolen crypto to the O.MG! evil lightning cable - and all the top security stories in between.π Read
via "Naked Security".
Naked Security
Monday review β the hot 22 stories of the week
From the hackerβs folks who whisked away his stolen crypto to the O.MG! evil lightning cable β and all the top security stories in between.
β Wi-Fi signals let researchers ID people through walls from their gait β
π Read
via "Naked Security".
Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.π Read
via "Naked Security".
Naked Security
Wi-Fi signals let researchers ID people through walls from their gait
Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.
β Social media platforms can be forced to delete illegal content worldwide β
π Read
via "Naked Security".
The EU's top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.π Read
via "Naked Security".
Naked Security
Social media platforms can be forced to delete illegal content worldwide
The EUβs top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.
β Facebook urged by governments to halt end-to-end encryption plans β
π Read
via "Naked Security".
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.π Read
via "Naked Security".
Naked Security
Facebook urged by governments to halt end-to-end encryption plans
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.
β Android devices hit by zero-day exploit Google thought it had patched β
π Read
via "Naked Security".
Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says β
π Read
via "Threatpost".
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.π Read
via "Threatpost".
Threat Post
Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.
π΄ 10 Steps to Assess SOC Maturity in SMBs π΄
π Read
via "Dark Reading: ".
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.π Read
via "Dark Reading: ".
Dark Reading
10 Steps to Assess SOC Maturity in SMBs
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.
π Shifting allegiances of hackers causing confusion for defense efforts π
π Read
via "Security on TechRepublic".
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.π Read
via "Security on TechRepublic".
TechRepublic
Shifting allegiances of hackers causing confusion for defense efforts
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.
π Nevada's New Consumer Privacy Law Goes Into Effect π
π Read
via "Subscriber Blog RSS Feed ".
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Nevada's New Consumer Privacy Law Goes Into Effect
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.
β Alabama Hospitals Pay Up in Ransomware Attack β
π Read
via "Threatpost".
A trio of Alabama hospitals have decided to pay for a decryption key.π Read
via "Threatpost".
Threat Post
Alabama Hospitals Pay Up in Ransomware Attack
A trio of Alabama hospitals have decided to pay for a decryption key.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.