π΄ Virginia a Hot Spot For Cybersecurity Jobs π΄
π Read
via "Dark Reading: ".
State has highest number of people in information security roles and the most current job openings, Comparitech study finds.π Read
via "Dark Reading: ".
Dark Reading
Virginia a Hot Spot For Cybersecurity Jobs
State has highest number of people in information security roles and the most current job openings, Comparitech study finds.
ATENTIONβΌ New - CVE-2017-2679
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-2678
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-2677
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-2676
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.π Read
via "National Vulnerability Database".
β Job seekers are scrubbing clean their social media accounts β
π Read
via "Naked Security".
Most people nowadays are quite aware that hiring managers put their social media postings under a microscope, a new survey finds.π Read
via "Naked Security".
Naked Security
Job seekers are scrubbing clean their social media accounts
Most people nowadays are quite aware that hiring managers put their social media postings under a microscope, a new survey finds.
β California outlaws facial recognition in police bodycams β
π Read
via "Naked Security".
The bill was introduced by Phil Ting: one of 26 state lawmakers misidentified as suspects in an ACLU test of the technology.π Read
via "Naked Security".
Naked Security
California outlaws facial recognition in police bodycams
The bill was introduced by Phil Ting: one of 26 state lawmakers misidentified as suspects in an ACLU test of the technology.
β Twitter used 2FA phone numbers for targeted advertising β
π Read
via "Naked Security".
Twitter may have βinadvertentlyβ handed phone and email data from some users to advertisers as part of its Tailored Audiences system that targets usersβ feeds with ads.π Read
via "Naked Security".
Naked Security
Twitter used 2FA phone numbers for targeted advertising
Twitter may have βinadvertentlyβ handed phone and email data from some users to advertisers as part of its Tailored Audiences system that targets usersβ feeds with ads.
β Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign β
π Read
via "Threatpost".
Attackers exploit an βunquoted pathβ flaw in the Bonjour updater in iTunes for Windows to deliver ransomware attacks.π Read
via "Threatpost".
Threat Post
Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign
Attackers exploit an βunquoted pathβ flaw in the Bonjour updater in iTunes for Windows to deliver ransomware attacks.
π΄ Network Security Must Transition into the Cloud Era π΄
π Read
via "Dark Reading: ".
An integrated approach is the best way to provide organizations with the tools they need to decrease the attack surface and use strong security controls.π Read
via "Dark Reading: ".
Dark Reading
Network Security Must Transition into the Cloud Era
An integrated approach is the best way to provide organizations with the tools they need to decrease the attack surface and use strong security controls.
β HP Touchpoint Analytics Opens PCs to Code Execution Attack β
π Read
via "Threatpost".
The vulnerability stems from an issue with DLL loading in Open Source Hardware, used by tens of millions of computers, researchers say.π Read
via "Threatpost".
Threat Post
HP Touchpoint Analytics Opens PCs to Code Execution Attack
The vulnerability stems from an issue with DLL loading in Open Source Hardware, used by tens of millions of computers, researchers say.
β Chinaβs Sway Over Tech Companies Tested with Apple, Blizzard β
π Read
via "Threatpost".
Apple has been called out by Chinese state-run media as protecting βrioters,β while Blizzard bans a Hearthstone player for supporting Hong Kong.π Read
via "Threatpost".
Threat Post
Chinaβs Sway Over Tech Companies Tested with Apple, Blizzard
Apple has been called out by Chinese state-run media as protecting βrioters,β while Blizzard bans a Hearthstone player for supporting Hong Kong.
π GRR 3.3.0.8 π
π Go!
via "Security Tool Files β Packet Storm".
GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
GRR 3.3.0.8 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Magecart Attack on Volusion Highlights Supply Chain Dangers π΄
π Read
via "Dark Reading: ".
Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.π Read
via "Dark Reading: ".
Darkreading
Magecart Attack on Volusion Highlights Supply Chain Dangers
Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.
π΄ Attackers Hide Behind Trusted Domains, HTTPS π΄
π Read
via "Dark Reading: ".
One in four malicious URLs employed a legitimate domain, making it more difficult for potential victims to spot possible dangers, a mid-year report finds.π Read
via "Dark Reading: ".
Darkreading
Attackers Hide Behind Trusted Domains, HTTPS
One in four malicious URLs employed a legitimate domain, making it more difficult for potential victims to spot possible dangers, a mid-year report finds.
β Sophisticated Spy Kit Targets Russians with Rare GSM Plugin β
π Read
via "Threatpost".
The Attor malware targets government and diplomatic victims with unusual tactics.π Read
via "Threatpost".
Threat Post
Sophisticated Spy Kit Targets Russians with Rare GSM Plugin
The Attor malware targets government and diplomatic victims with unusual tactics.
π McAfee, IBM join forces for global open source cybersecurity initiative π
π Read
via "Security on TechRepublic".
IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies.π Read
via "Security on TechRepublic".
TechRepublic
McAfee, IBM join forces for global open source cybersecurity initiative
IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies.
π IRS Employee Stole PII, Committed Fraud π
π Read
via "Subscriber Blog RSS Feed ".
The case illustrates that the government agency could be doing a better job safeguarding tax payer data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
IRS Employee Stole PII, Committed Fraud
The case illustrates that the government agency could be doing a better job safeguarding tax payer data.
π΄ Check Out New Cybersecurity Tools in the Black Hat Europe Arsenal π΄
π Read
via "Dark Reading: ".
Black Hat Europe returns to the Excel in London December 2-5 bearing a cornucopia of intriguing cybersecurity tools in its Arsenal.π Read
via "Dark Reading: ".
Dark Reading
Check Out New Cybersecurity Tools in the Black Hat Europe Arsenal
Black Hat Europe returns to the Excel in London December 2-5 bearing a cornucopia of intriguing cybersecurity tools in its Arsenal.
π΄ How to Think Like a Hacker π΄
π Read
via "Dark Reading: ".
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.π Read
via "Dark Reading: ".
Dark Reading
How to Think Like a Hacker
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.