β Alleged robber busted after Facebook-friending victim to apologize β
π Read
via "Naked Security".
He told her to put down the pizza delivery and all her money on top of it. 26 days later, he found her on Facebook and reached out.π Read
via "Naked Security".
Naked Security
Alleged robber busted after Facebook-friending victim to apologize
He told her to put down the pizza delivery and all her money on top of it. 26 days later, he found her on Facebook and reached out.
β Popular website plugin harboured a serious 0-day for years β
π Read
via "Naked Security".
The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.π Read
via "Naked Security".
Naked Security
Popular website plugin harboured a serious 0-day for years
The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.
π΄ Understanding SOCs' 4 Top Deficiencies π΄
π Read
via "Dark Reading: ".
In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.π Read
via "Dark Reading: ".
Dark Reading
Understanding SOCs' 4 Top Deficiencies
In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.
β Critical Bug Impacts Live555 Media Streaming Libraries β
π Read
via "The first stop for security news | Threatpost ".
A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Critical Bug Impacts Live555 Media Streaming Libraries
A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.
β Obamacare Sign-Up Channel Breach Affects 75K Consumers β
π Read
via "The first stop for security news | Threatpost ".
A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Obamacare Sign-Up Channel Breach Affects 75K Consumers
A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.
β The Danger and Opportunity in 5G Connectivity and IoT β
π Read
via "The first stop for security news | Threatpost ".
The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.π Read
via "The first stop for security news | Threatpost ".
Threat Post
The Danger and Opportunity in 5G Connectivity and IoT
The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.
π Why cybersecurity dominates concerns surrounding AI adoption π
π Read
via "Security on TechRepublic".
Even though artificial intelligence adoption is high, concerns regarding legal and ethical risks persist.π Read
via "Security on TechRepublic".
TechRepublic
Why cybersecurity dominates concerns surrounding AI adoption
Even though artificial intelligence adoption is high, concerns regarding legal and ethical risks persist.
π΄ Gartner Experts Highlight Tech Trends - And Their Security Risks π΄
π Read
via "Dark Reading: ".
Security must be built into systems and applications from the beginning of the design process, they agreed.π Read
via "Dark Reading: ".
Dark Reading
Gartner Experts Highlight Tech Trends - And Their Security Risks
Security must be built into systems and applications from the beginning of the design process, they agreed.
π Quantum computing: A cheat sheet π
π Read
via "Security on TechRepublic".
This resource covers the future of computing in the post-transistor age, and the technical hurdles inherent in the pursuit of quantum computing.π Read
via "Security on TechRepublic".
TechRepublic
Quantum computing: A cheat sheet
IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum.
π Ransomware: A cheat sheet for professionals π
π Read
via "Security on TechRepublic".
This guide covers Locky, WannaCry, Petya, and other ransomware attacks, the systems hackers target, and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection.π Read
via "Security on TechRepublic".
TechRepublic
Ransomware: A cheat sheet for professionals
This guide covers Locky, WannaCry, Petya, and other ransomware attacks, the systems hackers target, and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection.
π΄ Healthcare.gov FFE Breach Compromises 75K Users' Data π΄
π Read
via "Dark Reading: ".
Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.π Read
via "Dark Reading: ".
Darkreading
Healthcare.gov FFE Breach Compromises 75K Users' Data
Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.
π How to detect hardware-based server bugs π
π Read
via "Security on TechRepublic".
Following controversy from a recent Bloomberg report, here's how you should approach auditing physical hardware security.π Read
via "Security on TechRepublic".
TechRepublic
How to detect hardware-based server bugs
Following controversy from a recent Bloomberg report, here's how you should approach auditing physical hardware security.
π΄ 2018 State of Cyber Workforce π΄
π Read
via "Dark Reading: ".
Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.π Read
via "Dark Reading: ".
Dark Reading
2018 State of Cyber Workforce
Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.
π΄ UK, US to Sign Accord on AI, Cybersecurity Cooperation π΄
π Read
via "Dark Reading: ".
Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.π Read
via "Dark Reading: ".
Dark Reading
UK, US to Sign Accord on AI, Cybersecurity Cooperation
Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.
π΄ US Tops Global Malware C2 Distribution π΄
π Read
via "Dark Reading: ".
The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.π Read
via "Dark Reading: ".
Darkreading
US Tops Global Malware C2 Distribution
The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.
<b>⌨ Who Is Agent Tesla? ⌨</b>
<code>A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity β attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwareβs apparent creator seems to have done little to hide his real-life identity.</code><code>The proprietors of Agent Tesla market their product at agenttesla-dot-com, selling access to the software in monthly licenses paid for via bitcoin, for prices ranging from $15 to $69 per month depending on the desired features.</code><code>Media</code><code>The Agent Tesla Web site emphasizes that the software is strictly βfor monitoring your personel [sic] computer.β The siteβs βaboutβ page states that Agent Tesla βis not a malware. Please, donβt use for computers which is not access permission.β To backstop this disclaimer, the site warns that any users caught doing otherwise will have their software licenses revoked and subscriptions canceled.</code><code>At the same time, the Agent Tesla Web site and its 24/7 technical support channel (offered via Discord) is replete with instances of support personnel instructing users on ways to evade antivirus software detection, use software vulnerabilities to deploy the product, and secretly bundle the program inside of other file types, such as images, text, audio and even Microsoft Office files.</code><code>Media</code><code>A description of some of the options posted to the Agent Tesla sales Web site.</code><code>In August 2018, computer security firm LastLine said it witnessed a 100 percent increase in Agent Tesla instances detected in the wild over just a three month period.</code><code>βActing as a fully-functional information stealer, it is capable of extracting credentials from different browsers, mail, and FTP clients,β LastLine wrote. βIt logs keys and clipboards data, captures screen and video, and performs form-grabbing (Instagram, Twitter, Gmail, Facebook, etc.) attacks.β</code><code>Media</code><code>Most of the options included in Agent Tesla revolve around stealth, persistence, evading security tools, spreading to other computers, or tampering with system settings.</code><code>I CAN HAZ TESLA</code><code>The earliest versions of Agent Tesla were made available for free via a Turkish-language WordPress site that oddly enough remains online (agenttesla.wordpress-dot-com), although its home page now instructs users to visit the current AgentTesla-dot-com domain. Not long after that WordPress site was erected, its author(s) began charging for the software, accepting payments via a variety of means, including PayPal, Bitcoin and even wire transfer to several bank accounts in Turkey.</code><code>MediaHistoric WHOIS Web site registration records maintained by Domaintools.com show that the current domain for the software β agenttesla-dot-com β was registered in 2014 to a young man from Antalya, Turkey named Mustafa can Ozaydin, and to the email address mcanozaydin@gmail.com. Sometime in mid-2016 the siteβs registration records were hidden behind WHOIS privacy services [full disclosure: Domaintools is a previous advertiser on KrebsOnSecurity].</code><code>That Gmail address is tied to a Youtube.com account for a Turkish individual by the same name who has uploaded exactly three videos over the past four years. In one of them, uploaded in October 2017 and titled βweb panel,β Mr. can Ozaydin demonstrates how to configure a Web site. At around 3:45 in the video, we can see the purpose of this demonstration is to show people one way to install an Agent Tesla control panel to keep track of systems infected with the malware.</code><code>Incidentally, the administrator of the 24/7 live support channel for Agent Tesla users at one point instructed customers to view this sameβ¦
<code>A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity β attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwareβs apparent creator seems to have done little to hide his real-life identity.</code><code>The proprietors of Agent Tesla market their product at agenttesla-dot-com, selling access to the software in monthly licenses paid for via bitcoin, for prices ranging from $15 to $69 per month depending on the desired features.</code><code>Media</code><code>The Agent Tesla Web site emphasizes that the software is strictly βfor monitoring your personel [sic] computer.β The siteβs βaboutβ page states that Agent Tesla βis not a malware. Please, donβt use for computers which is not access permission.β To backstop this disclaimer, the site warns that any users caught doing otherwise will have their software licenses revoked and subscriptions canceled.</code><code>At the same time, the Agent Tesla Web site and its 24/7 technical support channel (offered via Discord) is replete with instances of support personnel instructing users on ways to evade antivirus software detection, use software vulnerabilities to deploy the product, and secretly bundle the program inside of other file types, such as images, text, audio and even Microsoft Office files.</code><code>Media</code><code>A description of some of the options posted to the Agent Tesla sales Web site.</code><code>In August 2018, computer security firm LastLine said it witnessed a 100 percent increase in Agent Tesla instances detected in the wild over just a three month period.</code><code>βActing as a fully-functional information stealer, it is capable of extracting credentials from different browsers, mail, and FTP clients,β LastLine wrote. βIt logs keys and clipboards data, captures screen and video, and performs form-grabbing (Instagram, Twitter, Gmail, Facebook, etc.) attacks.β</code><code>Media</code><code>Most of the options included in Agent Tesla revolve around stealth, persistence, evading security tools, spreading to other computers, or tampering with system settings.</code><code>I CAN HAZ TESLA</code><code>The earliest versions of Agent Tesla were made available for free via a Turkish-language WordPress site that oddly enough remains online (agenttesla.wordpress-dot-com), although its home page now instructs users to visit the current AgentTesla-dot-com domain. Not long after that WordPress site was erected, its author(s) began charging for the software, accepting payments via a variety of means, including PayPal, Bitcoin and even wire transfer to several bank accounts in Turkey.</code><code>MediaHistoric WHOIS Web site registration records maintained by Domaintools.com show that the current domain for the software β agenttesla-dot-com β was registered in 2014 to a young man from Antalya, Turkey named Mustafa can Ozaydin, and to the email address mcanozaydin@gmail.com. Sometime in mid-2016 the siteβs registration records were hidden behind WHOIS privacy services [full disclosure: Domaintools is a previous advertiser on KrebsOnSecurity].</code><code>That Gmail address is tied to a Youtube.com account for a Turkish individual by the same name who has uploaded exactly three videos over the past four years. In one of them, uploaded in October 2017 and titled βweb panel,β Mr. can Ozaydin demonstrates how to configure a Web site. At around 3:45 in the video, we can see the purpose of this demonstration is to show people one way to install an Agent Tesla control panel to keep track of systems infected with the malware.</code><code>Incidentally, the administrator of the 24/7 live support channel for Agent Tesla users at one point instructed customers to view this sameβ¦
π΄ Facebook Rumored to Be Hunting for Major Cybersecurity Acquisition π΄
π Read
via "Dark Reading: ".
Goal appears both a bid to bolster its own security and its tattered reputation for privacy, according to reporting by The Information.π Read
via "Dark Reading: ".
Dark Reading
Facebook Rumored to Be Hunting for Major Cybersecurity Acquisition
Goal appears both a bid to bolster its own security and its tattered reputation for privacy, according to reporting by The Information.
π΄ The Patching Paradox: A Path to Intelligent Vulnerability Management π΄
π Read
via "Dark Reading: ".
Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.π Read
via "Dark Reading: ".
Dark Reading
The Patching Paradox: A Path to Intelligent Vulnerability Management
Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.
π΄ What Keeps the CISO Awake at Night π΄
π Read
via "Dark Reading: ".
How to keep your CISO sleeping soundlyπ Read
via "Dark Reading: ".
Dark Reading
What Keeps the CISO Awake at Night
How to keep your CISO sleeping soundly
β Pirates! Donβt blame your illegal file sharing on family members β
π Read
via "Naked Security".
Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.π Read
via "Naked Security".
Naked Security
Pirates! Donβt blame your illegal file sharing on family members
Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.
β Why is Elon Musk promoting this Bitcoin scam? (Heβs not) β
π Read
via "Naked Security".
While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinking.... do such scams really work?π Read
via "Naked Security".
Naked Security
Why is Elon Musk promoting this Bitcoin scam? (Heβs not)
While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinkingβ¦. do such scams really work?