ATENTIONβΌ New - CVE-2015-9494
π Read
via "National Vulnerability Database".
The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9493
π Read
via "National Vulnerability Database".
The my-wish-list plugin before 1.4.2 for WordPress has multiple XSS issues.π Read
via "National Vulnerability Database".
π΄ Alliance Forms to Focus on Securing Operational Technology π΄
π Read
via "Dark Reading: ".
While mainly made up of vendors, the Operational Technology Cyber Security Alliance aims to offer security best practices for infrastructure operators and industrial partners.π Read
via "Dark Reading: ".
Dark Reading
Alliance Forms to Focus on Securing Operational Technology - Dark Reading
While mainly made up of vendors, the Operational Technology Cyber Security Alliance aims to offer security best practices for infrastructure operators and industrial partners.
π΄ About 50% of Apps Are Accruing Unaddressed Vulnerabilities π΄
π Read
via "Dark Reading: ".
In rush to fix newly discovered security issues, developers are neglecting to address older ones, Veracode study finds.π Read
via "Dark Reading: ".
Dark Reading
About 50% of Apps Are Accruing Unaddressed Vulnerabilities
In rush to fix newly discovered security issues, developers are neglecting to address older ones, Veracode study finds.
ATENTIONβΌ New - CVE-2015-9501
π Read
via "National Vulnerability Database".
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.π Read
via "National Vulnerability Database".
β Travel database exposed PII on US government employees β
π Read
via "Naked Security".
A property management company owned by hotel chain Best Western has exposed 179 GB of sensitive travel information on thousands of travelers.π Read
via "Naked Security".
Naked Security
Travel database exposed PII on US government employees
A property management company owned by hotel chain Best Western has exposed 179 GB of sensitive travel information on thousands of travelers.
β 15 Years Later, Metasploit Still Manages to be a Menace β
π Read
via "Threatpost".
A fresh look at the penetration testing tool Metasploit reveals the 15-year old hacking tool still has some tricks up its sleeves, even against modern defenses.π Read
via "Threatpost".
Threat Post
15 Years Later, Metasploit Still Manages to be a Menace
A fresh look at the penetration testing tool Metasploit reveals the 15-year old hacking tool still has some tricks up its sleeves even against modern defenses.
β Facebook pulls fake news networks linked to Russia and Iran β
π Read
via "Naked Security".
It took down four foreign interference campaigns and announced initiatives to prevent foreign interference in US elections.π Read
via "Naked Security".
Naked Security
Facebook pulls fake news networks linked to Russia and Iran
It took down four foreign interference campaigns and announced initiatives to prevent foreign interference in US elections.
β Hacker breached servers used by NordVPN β
π Read
via "Naked Security".
NordVPN has been forced to admit that a hacker stole an expired TLS certificate key used to securely connect customers to its web servers.π Read
via "Naked Security".
Naked Security
Hacker breached servers used by NordVPN
NordVPN has been forced to admit that a hacker stole an expired TLS certificate key used to securely connect customers to its web servers.
β Alexa and Google Home phishing apps demonstrated by researchers β
π Read
via "Naked Security".
The researchers' "Smart Spies" apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.π Read
via "Naked Security".
Naked Security
Alexa and Google Home phishing apps demonstrated by researchers
The researchersβ βSmart Spiesβ apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.
π΄ 8 Tips for More Secure Mobile Computing π΄
π Read
via "Dark Reading: ".
Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.π Read
via "Dark Reading: ".
Dark Reading
8 Tips for More Secure Mobile Computing
Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.
π΄ What Has Cybersecurity Pros So Stressed -- And Why It's Everyone's Problem π΄
π Read
via "Dark Reading: ".
As cyberattacks intensify and the skills gap broadens, it's hard not to wonder how much more those in the industry can take before throwing in the towel.π Read
via "Dark Reading: ".
Dark Reading
What Has Cybersecurity Pros So Stressed -- And Why It's Everyone's Problem
As cyberattacks intensify and the skills gap broadens, it's hard not to wonder how much more those in the industry can take before throwing in the towel.
β Critical Firefox Bugs Allow Arbitrary Code-Execution β
π Read
via "Threatpost".
Multiple critical memory safety bugs in Firefox 69 and Firefox ESR 68.1 in particular affect medium and large government entities and enterprises.π Read
via "Threatpost".
Threat Post
Firefox, Chrome Bugs Allow Arbitrary Code-Execution
Multiple critical memory safety bugs in Firefox 69 and Firefox ESR 68.1 in particular affect medium and large government entities and enterprises.
π΄ Report: 2020 Presidential Campaigns Still Vulnerable to Web Attacks π΄
π Read
via "Dark Reading: ".
Nine out of 12 Democratic candidates have yet to enable DNSSEC, a simple set of extensions that stops most targeted domain-based attacks.π Read
via "Dark Reading: ".
Darkreading
Report: 2020 Presidential Campaigns Still Vulnerable to Web Attacks
Nine out of 12 Democratic candidates have yet to enable DNSSEC, a simple set of extensions that stops most targeted domain-based attacks.
π΄ 10% of Small Businesses Breached Shut Down in 2019 π΄
π Read
via "Dark Reading: ".
As a result of cybercrime, 69% of small organizations were forced offline for a limited time and 37% experienced financial loss.π Read
via "Dark Reading: ".
Darkreading
10% of Small Businesses Breached Shut Down in 2019
As a result of cybercrime, 69% of small organizations were forced offline for a limited time and 37% experienced financial loss.
β ThreatList: Googleβs Advertising Network Dominates Global Data Collection β
π Read
via "Threatpost".
With DoubleClick, Analytics and AdWords under its belt, Google continues dominating when it comes to global data collection for advertising, a new report found.π Read
via "Threatpost".
Threat Post
ThreatList: Googleβs Advertising Network Dominates Global Data Collection
With DoubleClick, Analytics and AdWords under its belt, Google continues dominating when it comes to global data collection for advertising, a new report found.
π Air Force Planning IP Protection Group Of Its Own π
π Read
via "Subscriber Blog RSS Feed ".
To combat the ongoing epidemic around IP theft, the U.S. Air Force recently announced plans to develop an internal group to better protect the USAF's "hard-won intellectual property."π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Air Force Planning IP Protection Group Of Its Own
To combat the ongoing epidemic around IP theft, the U.S. Air Force recently announced plans to develop an internal group to better protect the USAF's "hard-won intellectual property."
π΄ Planning a Zero-Trust Initiative? Here's How to Prioritize π΄
π Read
via "Dark Reading: ".
If you start by focusing on users, data, access, and managed devices, you will make major strides toward achieving better security.π Read
via "Dark Reading: ".
Dark Reading
Planning a Zero-Trust Initiative? Here's How to Prioritize
If you start by focusing on users, data, access, and managed devices, you will make major strides toward achieving better security.
β Fujitsu Wireless Keyboard Plagued By Unpatched Flaws β
π Read
via "Threatpost".
Two high-severity vulnerabilities in a Fujitsu wireless keyboard expose passwords and allow keystroke injection attacks.π Read
via "Threatpost".
Threat Post
Fujitsu Wireless Keyboard Plagued By Unpatched Flaws
Two high-severity vulnerabilities in a Fujitsu wireless keyboard expose passwords and allow keystroke injection attacks.