π΄ Google Cloud Launches Security Health Analytics in Beta π΄
π Read
via "Dark Reading: ".
The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.π Read
via "Dark Reading: ".
Dark Reading
Google Cloud Launches Security Health Analytics in Beta
The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.
β .WAVs Hide Malware in Their Depths in Innovative Campaign β
π Read
via "Threatpost".
Three different loaders and two payloads are hiding in audio files.π Read
via "Threatpost".
Threat Post
.WAVs Hide Malware in Their Depths in Innovative Campaign
Two different payloads are hiding in audio files, each paired with one of three loaders.
β Silent Librarian Retools Phishing Emails to Hook Student Credentials β
π Read
via "Threatpost".
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.π Read
via "Threatpost".
Threat Post
Silent Librarian Retools Phishing Emails to Hook Student Credentials
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.
π΄ Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures π΄
π Read
via "Dark Reading: ".
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.π Read
via "Dark Reading: ".
Dark Reading
Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.
π The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic) π
π Read
via "Subscriber Blog RSS Feed ".
Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic)
Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.
π Blockchain is promising but it can't save the world π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain is promising but it can't save the world
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.
π Blockchain is promising but it can't save the world π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain is promising, but it can't save the world
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin, and IoT-connected devices.
π΄ SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance π΄
π Read
via "Dark Reading: ".
The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.π Read
via "Dark Reading: ".
Dark Reading
SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance
The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.
β 10 Steps for Ransomware Protection β
π Read
via "Threatpost".
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.π Read
via "Threatpost".
Threat Post
10 Steps for Ransomware Protection
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.
ATENTIONβΌ New - CVE-2015-9470 (history_collection)
π Read
via "National Vulnerability Database".
The history-collection plugin through 1.1.1 for WordPress has directory traversal via the download.php var parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9457 (pretty_link)
π Read
via "National Vulnerability Database".
The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter.π Read
via "National Vulnerability Database".
π΄ Cybersecurity Advice From Betty White π΄
π Read
via "Dark Reading: ".
Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Advice From Betty White
Among the beloved entertainer's advice: Double bag those passwords.Thanks, Betty.
π΄ How to Build a Rock-Solid Cybersecurity Culture π΄
π Read
via "Dark Reading: ".
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.π Read
via "Dark Reading: ".
Dark Reading
How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
π΄ Typosquatting Websites Proliferate in Run-up to US Elections π΄
π Read
via "Dark Reading: ".
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.π Read
via "Dark Reading: ".
Dark Reading
Typosquatting Websites Proliferate in Run-up to US Elections
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.
ATENTIONβΌ New - CVE-2015-9469 (content-grabber)
π Read
via "National Vulnerability Database".
The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id.π Read
via "National Vulnerability Database".
β Adobe fixes 46 critical bugs in patchfest β
π Read
via "Naked Security".
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.π Read
via "Naked Security".
Naked Security
Adobe fixes 46 critical bugs in patchfest
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.
β Hackers hack card details from BriansClub carding site β
π Read
via "Naked Security".
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards can't be abused.π Read
via "Naked Security".
Naked Security
Hackers hack card details from BriansClub carding site
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards canβt be abused.
β Robotic hand solves Rubikβs Cube by learning how to learn about it β
π Read
via "Naked Security".
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.π Read
via "Naked Security".
Naked Security
Robotic hand solves Rubikβs Cube by learning how to learn about it
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.
β Pen testers find mystery black box connected to shipβs engines β
π Read
via "Naked Security".
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was meant to be there.π Read
via "Naked Security".
Naked Security
Pen testers find mystery black box connected to shipβs engines
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was β¦
β S2 Ep 13: Weird Android zero day and other tech fails β Naked Security podcast β
π Read
via "Naked Security".
Listen to the latest episode now!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News