π΄ Can the Girl Scouts Save the Moon from Cyberattack? π΄
π Read
via "Dark Reading: ".
The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.π Read
via "Dark Reading: ".
Dark Reading
Can the Girl Scouts Save the Moon from Cyberattack?
The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.
π Faraday 3.9.2 π
π Go!
via "Security Tool Files β Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Faraday 3.9.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Intimate Details on Healthcare Workers Exposed as Cloud Security Lags β
π Read
via "Threatpost".
Ponemon survey data shows that only a third of IT staff say they take a security-first approach to data storage in the cloud.π Read
via "Threatpost".
Threatpost
Intimate Details on Healthcare Workers Exposed as Cloud Security Lags
Ponemon survey data shows that only a third of IT staff say they take a security-first approach to data storage in the cloud.
π΄ NSA Issues Advisory on VPN Vulnerability Trio π΄
π Read
via "Dark Reading: ".
Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.π Read
via "Dark Reading: ".
Darkreading
NSA Issues Advisory on VPN Vulnerability Trio
Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.
π΄ Utilities' Operational Networks Continue to Be Vulnerable π΄
π Read
via "Dark Reading: ".
More than half of utilities have suffered an outage or data loss in the last 12 months, but only a minority of organizations seem ready for an attack that could affect operations, a survey finds.π Read
via "Dark Reading: ".
Darkreading
Utilities' Operational Networks Continue to Be Vulnerable
More than half of utilities have suffered an outage or data loss in the last 12 months, but only a minority of organizations seem ready for an attack that could affect operations, a survey finds.
π΄ Microsoft Issues 9 Critical Security Patches π΄
π Read
via "Dark Reading: ".
None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
β TOMS hacker tells people to log off and enjoy a screenless day β
π Read
via "Naked Security".
TOMS seems like a really nice shoe company, and it just got hacked in a really nice way. But it's still a hack.π Read
via "Naked Security".
Naked Security
TOMS hacker tells people to log off and enjoy a screenless day
TOMS seems like a really nice shoe company, and it just got hacked in a really nice way. But itβs still a hack.
β Copy-and-paste sharing on Stack Overflow spreads insecure code β
π Read
via "Naked Security".
Itβs the time-saving technique employed by many coders - copy and paste code from crowd-sourcing 'Q&A' websites. But is it always secure?π Read
via "Naked Security".
Naked Security
Copy-and-paste sharing on Stack Overflow spreads insecure code
Itβs the time-saving technique employed by many coders β copy and paste code from crowd-sourcing βQ&Aβ websites. But is it always secure?
β Deepfakes have doubled, overwhelmingly targeting women β
π Read
via "Naked Security".
Deepfake tech has push-button apps and service portals. Can code commodification do the same for detection, so women can actually afford it?π Read
via "Naked Security".
Naked Security
Deepfakes have doubled, overwhelmingly targeting women
Deepfake tech has push-button apps and service portals. Can code commodification do the same for detection, so women can actually afford it?
β Twitter Uses Phone Numbers, Emails to Sell Ads β
π Read
via "Threatpost".
Data collected for two-factor authentication purposes βinadvertentlyβ matched users to targeted-advertising lists, the company admits.π Read
via "Threatpost".
Threat Post
Twitter Uses Phone Numbers, Emails to Sell Ads
Data collected for two-factor authentication purposes βinadvertentlyβ matched users to targeted-advertising lists, the company admits.
β October Patch Tuesday: Microsoft fixes critical remote desktop bug β
π Read
via "Naked Security".
Microsoft fixed 59 vulnerabilities in October's Patch Tuesday, including several critical remote code execution (RCE) flaws.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ How the Software-Defined Perimeter Is Redefining Access Control π΄
π Read
via "Dark Reading: ".
In a world where traditional network boundaries no longer exist, VPNs are showing their age.π Read
via "Dark Reading: ".
Darkreading
How the Software-Defined Perimeter Is Redefining Access Control
In a world where traditional network boundaries no longer exist, VPNs are showing their age.
π OpenSSH 8.1p1 π
π Go!
via "Security Tool Files β Packet Storm".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
OpenSSH 8.1p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π 70% of business report Pass the Hash attacks directly impact operational costs π
π Read
via "Security on TechRepublic".
Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials.π Read
via "Security on TechRepublic".
TechRepublic
70% of businesses report Pass the Hash attacks directly impact operational costs
Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials.
β Privacy Groups: Ringβs Police Partnerships Can Lead to Sinister Ends β
π Read
via "Threatpost".
Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.π Read
via "Threatpost".
Threat Post
Privacy Groups: Ringβs Police Partnerships Can Lead to Sinister Ends
Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.
π΄ Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers π΄
π Read
via "Dark Reading: ".
Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.π Read
via "Dark Reading: ".
Dark Reading
Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers
Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.
π Financial industry spending millions to deal with breaches in 2019 π
π Read
via "Security on TechRepublic".
A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.π Read
via "Security on TechRepublic".
TechRepublic
Financial industry spends millions to deal with breaches
A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.
π΄ A Realistic Threat Model for the Masses π΄
π Read
via "Dark Reading: ".
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.π Read
via "Dark Reading: ".
Dark Reading
A Realistic Threat Model for the Masses
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.
π Tech Industry Group Urges EU to Reconsider ePrivacy π
π Read
via "Subscriber Blog RSS Feed ".
A European tech organization is encouraging the European Commission to reconsider its proposal for ePrivacy Regulation, a proposal that's set to regulate cookie usage.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Tech Industry Group Urges EU to Reconsider ePrivacy
A European tech organization is encouraging the European Commission to reconsider its proposal for ePrivacy Regulation, a proposal that's set to regulate cookie usage.
β Most Americans Fail Cybersecurity Quiz β
π Read
via "Threatpost".
Study participants fail to correctly identify core security concepts and tools to help them stay safe online.π Read
via "Threatpost".
Threat Post
Most Americans Fail Cybersecurity Quiz
Study participants fail to correctly identify core security concepts and tools to help them stay safe online.
π΄ USB Drive Security Still Lags π΄
π Read
via "Dark Reading: ".
While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use.π Read
via "Dark Reading: ".
Dark Reading
USB Drive Security Still Lags
While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use.