π State of Washington has new laws and the Air National Guard to help secure 2018 midterm election π
π Read
via "Security on TechRepublic".
Washington state aims to stay protected this election season via anti-hacking efforts of the Air National Guard, as well as strengthened audit proceduresπ Read
via "Security on TechRepublic".
TechRepublic
State of Washington has new laws and the Air National Guard to help secure 2018 midterm election
Washington state aims to stay protected this election season via anti-hacking efforts of the Air National Guard, as well as strengthened audit procedures
π΄ Inside the Dark Web's 'Help Wanted' Ads π΄
π Read
via "Dark Reading: ".
How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.π Read
via "Dark Reading: ".
Darkreading
Inside the Dark Web's 'Help Wanted' Ads
How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.
ATENTIONβΌ New - CVE-2016-9069
π Read
via "National Vulnerability Database".
A use-after-free in nsINode::ReplaceOrInsertBefore during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox < 50.π Read
via "National Vulnerability Database".
π΄ Apache Access Vulnerability Could Affect Thousands of Applications π΄
π Read
via "Dark Reading: ".
A recently discovered issue with a common file access method could be a major new attack surface for malware authors.π Read
via "Dark Reading: ".
Dark Reading
Apache Access Vulnerability Could Affect Thousands of Applications
A recently discovered issue with a common file access method could be a major new attack surface for malware authors.
β GreyEnergy Spy APT Mounts Sophisticated Effort Against Critical Infrastructure β
π Read
via "The first stop for security news | Threatpost ".
The group is a successor to BlackEnergy and a subset of the TeleBots gang--and its activity is potentially a prelude to a much more destructive attack.π Read
via "The first stop for security news | Threatpost ".
Threat Post
GreyEnergy Spy APT Mounts Sophisticated Effort Against Critical Infrastructure
The group is a successor to BlackEnergy and a subset of the TeleBots gangβand its activity is potentially a prelude to a much more destructive attack.
β Tumblr Privacy Bug Could Have Exposed Sensitive Account Data β
π Read
via "The first stop for security news | Threatpost ".
Tumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Tumblr Privacy Bug Could Have Exposed Sensitive Account Data
Tumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.
π Apple to US users: Here's how you can now see what personal data we hold on you π
π Read
via "Security on TechRepublic".
Apple's privacy tools now go beyond Europe, so more now get to download the personal data it has collected.π Read
via "Security on TechRepublic".
TechRepublic
Apple to US users: Here's how you can now see what personal data we hold on you
Apple's privacy tools now go beyond Europe, so more now get to download the personal data it has collected.
π Why cloud security is the top IT budget priority for 2019 π
π Read
via "Security on TechRepublic".
Research from Threat Stack found that 54% of companies are worried about outgrowing their current security solutions.π Read
via "Security on TechRepublic".
TechRepublic
Why cloud security is the top IT budget priority for 2019
Research from Threat Stack found that 54% of companies are worried about outgrowing their current security solutions.
π΄ 7 Ways A Collaboration System Could Wreck Your IT Security π΄
π Read
via "Dark Reading: ".
The same traits that make collaboration systems so useful for team communications can help hackers, too.π Read
via "Dark Reading: ".
Dark Reading
7 Ways A Collaboration System Could Wreck Your IT Security
The same traits that make collaboration systems so useful for team communications can help hackers, too.
π Why digital transformation puts you at greater risk for cyberattacks π
π Read
via "Security on TechRepublic".
Companies that do not keep up with their digital transformation initiatives may see a $1 million or more loss due to cyberattacks.π Read
via "Security on TechRepublic".
TechRepublic
Why digital transformation puts you at greater risk for cyberattacks
Companies that do not keep up with their digital transformation initiatives may see a $1 million or more loss due to cyberattacks.
π Top 5 ways to maximize customers' data security π
π Read
via "Security on TechRepublic".
Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways to maximize customers' data security
Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.
π΄ Former Equifax Manager Sentenced for Insider Trading π΄
π Read
via "Dark Reading: ".
Sudhakar Bonthu bought and sold Equifax stock options prior to the public disclosure of its 2017 data breach.π Read
via "Dark Reading: ".
Darkreading
Former Equifax Manager Sentenced for Insider Trading
Sudhakar Bonthu bought and sold Equifax stock options prior to the public disclosure of its 2017 data breach.
π Top 5 ways to maximize customer data security π
π Read
via "Security on TechRepublic".
Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways to maximize customer data security
Customers are starting to get the message that their data is valuable. Tom Merritt offers five suggestions to ensure your customers' data isn't vulnerable to attack.
β New APT Could Signal Reemergence of Notorious Comment Crew β
π Read
via "The first stop for security news | Threatpost ".
A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.π Read
via "The first stop for security news | Threatpost ".
Threat Post
New APT Could Signal Reemergence of Notorious Comment Crew
A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crewβs proprietary code.
π΄ New Security Woes for Popular IoT Protocols π΄
π Read
via "Dark Reading: ".
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.π Read
via "Dark Reading: ".
Dark Reading
New Security Woes for Popular IoT Protocols
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
π΄ How to Get Consumers to Forgive You for a Breach π΄
π Read
via "Dark Reading: ".
It starts with already-established trust, a new survey shows.π Read
via "Dark Reading: ".
Dark Reading
How to Get Consumers to Forgive You for a Breach
It starts with already-established trust, a new survey shows.
ATENTIONβΌ New - CVE-2015-4633
π Read
via "National Vulnerability Database".
Multiple SQL injection vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow (1) remote attackers to execute arbitrary SQL commands via the number parameter to opac-tags_subject.pl in the OPAC interface or (2) remote authenticated users to execute arbitrary SQL commands via the Filter or (3) Criteria parameter to reports/borrowers_out.pl in the Staff interface.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-4632
π Read
via "National Vulnerability Database".
Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.π Read
via "National Vulnerability Database".