β UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity β
π Read
via "Threatpost".
UniCredit was also hit with hacking incidents in September-October 2016 and June-July 2017.π Read
via "Threatpost".
Threat Post
UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity
UniCredit was also hit with hacking incidents in September-October 2016 and June-July 2017.
π Hackers finding ways to exploit automotive software to overtake cars π
π Read
via "Security on TechRepublic".
A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.π Read
via "Security on TechRepublic".
TechRepublic
Hackers finding ways to exploit automotive software to overtake cars
A new report from IntSights details the many ways cybercriminals break into a new generation of highly digitized cars.
π΄ Is Voting by Mobile App a Better Security Option or Just 'A Bad Idea'? π΄
π Read
via "Dark Reading: ".
Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.π Read
via "Dark Reading: ".
Dark Reading
Is Voting by Mobile App a Better Security Option or Just 'A Bad Idea'?
Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.
π΄ Pwn2Own Adds Industrial Control Systems to Hacking Contest π΄
π Read
via "Dark Reading: ".
The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.π Read
via "Dark Reading: ".
Darkreading
Pwn2Own Adds Industrial Control Systems to Hacking Contest
The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.
π Stegano 0.9.7 π
π Go!
via "Security Tool Files β Packet Storm".
Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Stegano 0.9.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Top 5 things to know about alternative data π
π Read
via "Security on TechRepublic".
Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about alternative data
Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.
π Top 5 things to know about alternative data π
π Read
via "Security on TechRepublic".
Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about alternative data
Alternative data allows businesses to discover trends and financial opportunities without compromising consumer privacy. Tom Merritt explains the five things you need to know about alternative data.
π΄ Fortinet Bolsters Endpoint Security with enSilo Acquisition π΄
π Read
via "Dark Reading: ".
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.π Read
via "Dark Reading: ".
Dark Reading
Fortinet Bolsters Endpoint Security with enSilo Acquisition
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.
β New Facebook AI fools facial recognition β
π Read
via "Naked Security".
The technology - which Facebook won't use in its own apps - subtly distorts face images so they're still recognizable, but not to machines.π Read
via "Naked Security".
Naked Security
New Facebook AI fools facial recognition
The technology β which Facebook wonβt use in its own apps β subtly distorts face images so theyβre still recognizable, but not to machines.
β PHP team fixes nasty site-owning remote execution bug β
π Read
via "Naked Security".
The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language.π Read
via "Naked Security".
Naked Security
PHP team fixes nasty site-owning remote execution bug
The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language.
β Gradient βcelebrity matchingβ photo app sparks privacy fears β
π Read
via "Naked Security".
The Kardashians love the Gradient app - but they're being paid to use it, whereas for you it's the other way round. Is it safe?π Read
via "Naked Security".
Naked Security
Gradient βcelebrity matchingβ photo app sparks privacy fears
The Kardashians love the Gradient app β but theyβre being paid to use it, whereas for you itβs the other way round. Is it safe?
β ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical β
π Read
via "Threatpost".
Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found.π Read
via "Threatpost".
Threat Post
ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical
Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found.
β Country of Georgia Suffers Widespread Cyberattack β
π Read
via "Threatpost".
The attack on local web-hosting provider Pro-Service - likely politically motivated - took out 2,000 websites and the national television station.π Read
via "Threatpost".
Threat Post
Country of Georgia Suffers Widespread Cyberattack
The attack on local web-hosting provider Proservice - likely politically motivated - took out 2,000 websites and the national television station.
π΄ What Do You Do When You Can't Patch Your IoT Endpoints? π΄
π Read
via "Dark Reading: ".
The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.π Read
via "Dark Reading: ".
Dark Reading
What Do You Do When You Can't Patch Your IoT Endpoints?
The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.
π΄ Why It's Imperative to Bridge the IT & OT Cultural Divide π΄
π Read
via "Dark Reading: ".
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.π Read
via "Dark Reading: ".
Dark Reading
Why It's Imperative to Bridge the IT & OT Cultural Divide
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.
ATENTIONβΌ New - CVE-2015-9506 (amazon_s3, easy_digital_downloads)
π Read
via "National Vulnerability Database".
The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.π Read
via "National Vulnerability Database".
β Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom β
π Read
via "Threatpost".
The APT is once again targeting the sports world, Microsoft warns.π Read
via "Threatpost".
Threat Post
Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom
The APT is once again targeting the sports world, Microsoft warns.
β New Adwind Variant Targets Windows, Chromium Credentials β
π Read
via "Threatpost".
A new version of the typically platform-agnostic Adwind trojan has been spotted targeting Windows applications and systems and Chromium-based browsers.π Read
via "Threatpost".
Threat Post
New Adwind Variant Targets Windows, Chromium Credentials
A new version of the typically platform-agnostic Adwind trojan has been spotted targeting Windows applications and systems and Chromium-based browsers.
π΄ Cybersecurity Trumps Political, Reputational Concerns for Companies π΄
π Read
via "Dark Reading: ".
The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Trumps Political, Reputational Concerns for Companies
The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.
β Jokerβs Stash Drops Largest-Ever Credit Card Cache on Dark Web β
π Read
via "Threatpost".
1.3 million stolen cards, mostly from India, could fetch $130 million for the cybercrooks.π Read
via "Threatpost".
Threat Post
Jokerβs Stash Drops Largest-Ever Credit Card Cache on Dark Web
1.3 million stolen cards, mostly from India, could fetch $130 million for the cybercrooks.