π΄ How to Build a Rock-Solid Cybersecurity Culture π΄
π Read
via "Dark Reading: ".
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.π Read
via "Dark Reading: ".
Dark Reading
How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
π΄ Typosquatting Websites Proliferate in Run-up to US Elections π΄
π Read
via "Dark Reading: ".
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.π Read
via "Dark Reading: ".
Dark Reading
Typosquatting Websites Proliferate in Run-up to US Elections
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.
ATENTIONβΌ New - CVE-2015-9469 (content-grabber)
π Read
via "National Vulnerability Database".
The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id.π Read
via "National Vulnerability Database".
β Adobe fixes 46 critical bugs in patchfest β
π Read
via "Naked Security".
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.π Read
via "Naked Security".
Naked Security
Adobe fixes 46 critical bugs in patchfest
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.
β Hackers hack card details from BriansClub carding site β
π Read
via "Naked Security".
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards can't be abused.π Read
via "Naked Security".
Naked Security
Hackers hack card details from BriansClub carding site
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards canβt be abused.
β Robotic hand solves Rubikβs Cube by learning how to learn about it β
π Read
via "Naked Security".
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.π Read
via "Naked Security".
Naked Security
Robotic hand solves Rubikβs Cube by learning how to learn about it
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.
β Pen testers find mystery black box connected to shipβs engines β
π Read
via "Naked Security".
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was meant to be there.π Read
via "Naked Security".
Naked Security
Pen testers find mystery black box connected to shipβs engines
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was β¦
β S2 Ep 13: Weird Android zero day and other tech fails β Naked Security podcast β
π Read
via "Naked Security".
Listen to the latest episode now!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Palo Alto Networks discovers new cryptojacking worm mining for Monero π
π Read
via "Security on TechRepublic".
This is the first time that a cryptojacking attack has been observed on Docker.π Read
via "Security on TechRepublic".
TechRepublic
Palo Alto Networks discovers new cryptojacking worm mining for Monero
This is the first time that a cryptojacking attack has been observed on Docker.
π΄ Data Privacy Protections for the Most Vulnerable - Children π΄
π Read
via "Dark Reading: ".
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.π Read
via "Dark Reading: ".
Dark Reading
Data Privacy Protections for the Most Vulnerable - Children
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.
β Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS β
π Read
via "Threatpost".
The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit.π Read
via "Threatpost".
Threat Post
Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS
A pair of bugs in the Kubernetes open-source cloud container software can be βhighly dangerousβ under some Kubernetes configurations, according to researchers. The flaws, CVE-2019-16276 and CVE-2019-11253, have been patched in Kubernetes builds 1.14.8, 1.15.5β¦
β Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws β
π Read
via "Threatpost".
Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.π Read
via "Threatpost".
Threat Post
Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws
Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.
β Trump Campaign Website Left Open to Email Server Hijack β
π Read
via "Threatpost".
A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trumpβs official campaign website.π Read
via "Threatpost".
Threat Post
Trump Campaign Website Left Open to Email Server Hijack
A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trumpβs official campaign website.
π Suricata IDPE 5.0.0 π
π Go!
via "Security Tool Files β Packet Storm".
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Suricata IDPE 5.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Cozy Bear Emerges from Hibernation to Hack EU Ministries π΄
π Read
via "Dark Reading: ".
The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.π Read
via "Dark Reading: ".
Darkreading
Cozy Bear Emerges from Hibernation to Hack EU Ministries
The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.
ATENTIONβΌ New - CVE-2015-9479 (acf_fronted_display)
π Read
via "National Vulnerability Database".
The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php.π Read
via "National Vulnerability Database".
π΄ Yahoo Breach Victims May Qualify for $358 Payout π΄
π Read
via "Dark Reading: ".
Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.π Read
via "Dark Reading: ".
Dark Reading
Yahoo Breach Victims May Qualify for $358 Payout
Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.
β Hacking Back? BriansClub Dark Web Attack a Boon for Banks β
π Read
via "Threatpost".
The theft of 26 million card records from an underground site offers valuable intel for banks.π Read
via "Threatpost".
Threat Post
Hacking Back? BriansClub Dark Web Attack a Boon for Banks
The theft of 26 million card records from an underground site offers valuable intel for banks.
π 70 Percent of Healthcare Breach Data Could Lead to ID Theft π
π Read
via "Subscriber Blog RSS Feed ".
New research looks at 10 years of healthcare data breaches and breaks down the specific types of data exposed.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
70 Percent of Healthcare Breach Data Could Lead to ID Theft
New research looks at 10 years of healthcare data breaches and breaks down the specific types of data exposed.
π How to find the Firefox Certificate Viewer π
π Read
via "Security on TechRepublic".
Mozilla is set to launch a Certificate Viewer. Find out why and how to open it.π Read
via "Security on TechRepublic".