π΄ Fortinet Bolsters Endpoint Security with enSilo Acquisition π΄
π Read
via "Dark Reading: ".
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.π Read
via "Dark Reading: ".
Dark Reading
Fortinet Bolsters Endpoint Security with enSilo Acquisition
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.
β New Facebook AI fools facial recognition β
π Read
via "Naked Security".
The technology - which Facebook won't use in its own apps - subtly distorts face images so they're still recognizable, but not to machines.π Read
via "Naked Security".
Naked Security
New Facebook AI fools facial recognition
The technology β which Facebook wonβt use in its own apps β subtly distorts face images so theyβre still recognizable, but not to machines.
β PHP team fixes nasty site-owning remote execution bug β
π Read
via "Naked Security".
The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language.π Read
via "Naked Security".
Naked Security
PHP team fixes nasty site-owning remote execution bug
The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language.
β Gradient βcelebrity matchingβ photo app sparks privacy fears β
π Read
via "Naked Security".
The Kardashians love the Gradient app - but they're being paid to use it, whereas for you it's the other way round. Is it safe?π Read
via "Naked Security".
Naked Security
Gradient βcelebrity matchingβ photo app sparks privacy fears
The Kardashians love the Gradient app β but theyβre being paid to use it, whereas for you itβs the other way round. Is it safe?
β ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical β
π Read
via "Threatpost".
Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found.π Read
via "Threatpost".
Threat Post
ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical
Overall, across all retail programs, more than 18 percent of all bug bounty submissions are critical in severity, a new Bugcrowd report found.
β Country of Georgia Suffers Widespread Cyberattack β
π Read
via "Threatpost".
The attack on local web-hosting provider Pro-Service - likely politically motivated - took out 2,000 websites and the national television station.π Read
via "Threatpost".
Threat Post
Country of Georgia Suffers Widespread Cyberattack
The attack on local web-hosting provider Proservice - likely politically motivated - took out 2,000 websites and the national television station.
π΄ What Do You Do When You Can't Patch Your IoT Endpoints? π΄
π Read
via "Dark Reading: ".
The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.π Read
via "Dark Reading: ".
Dark Reading
What Do You Do When You Can't Patch Your IoT Endpoints?
The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.
π΄ Why It's Imperative to Bridge the IT & OT Cultural Divide π΄
π Read
via "Dark Reading: ".
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.π Read
via "Dark Reading: ".
Dark Reading
Why It's Imperative to Bridge the IT & OT Cultural Divide
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.
ATENTIONβΌ New - CVE-2015-9506 (amazon_s3, easy_digital_downloads)
π Read
via "National Vulnerability Database".
The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.π Read
via "National Vulnerability Database".
β Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom β
π Read
via "Threatpost".
The APT is once again targeting the sports world, Microsoft warns.π Read
via "Threatpost".
Threat Post
Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom
The APT is once again targeting the sports world, Microsoft warns.
β New Adwind Variant Targets Windows, Chromium Credentials β
π Read
via "Threatpost".
A new version of the typically platform-agnostic Adwind trojan has been spotted targeting Windows applications and systems and Chromium-based browsers.π Read
via "Threatpost".
Threat Post
New Adwind Variant Targets Windows, Chromium Credentials
A new version of the typically platform-agnostic Adwind trojan has been spotted targeting Windows applications and systems and Chromium-based browsers.
π΄ Cybersecurity Trumps Political, Reputational Concerns for Companies π΄
π Read
via "Dark Reading: ".
The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Trumps Political, Reputational Concerns for Companies
The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.
β Jokerβs Stash Drops Largest-Ever Credit Card Cache on Dark Web β
π Read
via "Threatpost".
1.3 million stolen cards, mostly from India, could fetch $130 million for the cybercrooks.π Read
via "Threatpost".
Threat Post
Jokerβs Stash Drops Largest-Ever Credit Card Cache on Dark Web
1.3 million stolen cards, mostly from India, could fetch $130 million for the cybercrooks.
π Research finds 2019 increase in breaches and cybersecurity spending π
π Read
via "Security on TechRepublic".
The ServiceNow and Ponemon study found an average 24% increase in cybersecurity spending and a 17% rise in attacks.π Read
via "Security on TechRepublic".
TechRepublic
Research finds 2019 increase in breaches and cybersecurity spending
The ServiceNow and Ponemon study found an average 24% increase in cybersecurity spending and a 17% rise in attacks.
π΄ Who Made the List Of 2019's Nastiest Malware? π΄
π Read
via "Dark Reading: ".
This year's compilation features well-known ransomware, botnet, and cryptomining software.π Read
via "Dark Reading: ".
Darkreading
Who Made the List Of 2019's Nastiest Malware?
This year's compilation features well-known ransomware, botnet, and cryptomining software.
π΄ Google Cloud Adds New Security Management Tools to G Suite π΄
π Read
via "Dark Reading: ".
Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.π Read
via "Dark Reading: ".
Dark Reading
Google Cloud Adds New Security Management Tools to G Suite
Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.
π΄ Why Cloud-Native Applications Need Cloud-Native Security π΄
π Read
via "Dark Reading: ".
Today's developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide.π Read
via "Dark Reading: ".
Dark Reading
Why Cloud-Native Applications Need Cloud-Native Security
Today's developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide.
π How to secure OneDrive files and folders with Personal Vault π
π Read
via "Security on TechRepublic".
Learn how to make specific folders and files on OneDrive more secure by using Personal Vault.π Read
via "Security on TechRepublic".
TechRepublic
How to secure OneDrive files and folders with Personal Vault
Learn how to make specific folders and files on OneDrive more secure by using Personal Vault.
π Hacker Faces Jailtime After Stealing Employee, Company Data At Two Firms π
π Read
via "Subscriber Blog RSS Feed ".
A man admitted he installed keyloggers at two companies and used them as a launching pad to steal data on emerging technology they were developing.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacker Faces Jailtime After Stealing Employee, Company Data At Two Firms
A man admitted he installed keyloggers at two companies and used them as a launching pad to steal data on emerging technology they were developing.
π΄ The Real Reasons Why the C-Suite Isn't Complying with Security π΄
π Read
via "Dark Reading: ".
Is the C-suite really that bad at following security policy? Or is it a case of mixed messages and misunderstanding?π Read
via "Dark Reading: ".
Dark Reading
The Real Reasons Why the C-Suite Isn't Complying with Security
Is the C-suite really that bad at following security policy? Or is it a case of mixed messages and misunderstanding?