π΄ Free & Discounted Security Services Now Available for US Election Orgs π΄
π Read
via "Dark Reading: ".
Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.π Read
via "Dark Reading: ".
Dark Reading
Free & Discounted Security Services Now Available for US Election Orgs
Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.
β Solar, Wind Power Utility Disrupted in Rare Cyberattack β
π Read
via "Threatpost".
A simple attack on an unpatched server could have been catastrophic for the Utah-based utility.π Read
via "Threatpost".
Threat Post
Solar, Wind Power Utility Disrupted in Rare Cyberattack
A simple attack on an unpatched server could have been catastrophic for the Utah-based utility.
β Office for Mac Users Warned of Malicious SYLK Files β
π Read
via "Threatpost".
Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.π Read
via "Threatpost".
Threat Post
Office for Mac Users Warned of Malicious SYLK Files
Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.
ATENTIONβΌ New - CVE-2005-2352
π Read
via "National Vulnerability Database".
I race condition in Temp files was found in gs-gpl before 8.56 addons scripts.π Read
via "National Vulnerability Database".
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
Roundup: From updating macOS Catalina and old i-devices, to the ransomware attack that took a city offline - and everything in between.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
Roundup: From updating macOS Catalina and old i-devices, to the ransomware attack that took a city offline β and everything in between.
β US grounds Chinese-made drones as part of security review β
π Read
via "Naked Security".
The exception: drones being used in emergencies, such as fighting wildfires, search and rescue, and dealing with natural disasters.π Read
via "Naked Security".
Naked Security
US grounds Chinese-made drones as part of security review
The exception: drones being used in emergencies, such as fighting wildfires, search and rescue, and dealing with natural disasters.
β BlueKeep Attacks Have Arrived, Are Initially Underwhelming β
π Read
via "Threatpost".
The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.π Read
via "Threatpost".
Threat Post
BlueKeep Attacks Have Arrived, Are Initially Underwhelming
The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.
β Undercover reporter tells all after working for a Polish troll farm β
π Read
via "Naked Security".
Together with her troll colleagues, she managed 200 fake social profiles, promoted clientsβ products, and trolled their competitors.π Read
via "Naked Security".
Naked Security
Undercover reporter tells all after working for a Polish troll farm
Together with her troll colleagues, she managed 200 fake social profiles, promoted clientsβ products, and trolled their competitors.
π΄ New: 2019 State of the Internet / Security: Phishing - Baiting the Hook π΄
π Read
via "Dark Reading: ".
Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.π Read
via "Dark Reading: ".
Dark Reading
New: 2019 State of the Internet / Security: Phishing - Baiting the Hook
Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.
β Pentagon publishes AI guidelines β
π Read
via "Naked Security".
As the specter of warrior robots looms large, the Pentagon has published a set of ethical guidelines for its use of artificial intelligence.π Read
via "Naked Security".
Naked Security
Pentagon publishes AI guidelines
As the specter of warrior robots looms large, the Pentagon has published a set of ethical guidelines for its use of artificial intelligence.
β Russiaβs sovereign internet law comes into force β
π Read
via "Naked Security".
The new law compels the countryβs ISPs to forward all data arriving and departing from their networks through special gateway servers.π Read
via "Naked Security".
Naked Security
Russiaβs sovereign internet law comes into force
The new law compels the countryβs ISPs to forward all data arriving and departing from their networks through special gateway servers.
π΄ To Secure Multicloud Environments, First Acknowledge You Have a Problem π΄
π Read
via "Dark Reading: ".
Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.π Read
via "Dark Reading: ".
Dark Reading
To Secure Multicloud Environments, First Acknowledge You Have a Problem
Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.
π΄ Edge Feature Section π΄
π Read
via "Dark Reading: ".
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen bookπ Read
via "Dark Reading: ".
Dark Reading
Edge Feature Section - Dark Reading
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book
π΄ How HR and IT Can Partner to Improve Cybersecurity π΄
π Read
via "Dark Reading: ".
With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.π Read
via "Dark Reading: ".
Dark Reading
How HR and IT Can Partner to Improve Cybersecurity
With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.
β BEC Scam Costs Media Giant Nikkei $29 Million β
π Read
via "Threatpost".
In September, a Nikkei America employee transferred $29 million to BEC scammers who were purporting to be a Nikkei executive.π Read
via "Threatpost".
Threat Post
BEC Scam Costs Media Giant Nikkei $29 Million
In September, a Nikkei America employee transferred $29 million to BEC scammers who were purporting to be a Nikkei executive.
β Critical Remote Code Execution Flaw Found in Open Source rConfig Utility β
π Read
via "Threatpost".
The network configuration management utility has two unpatched critical remote code execution vulnerabilities.π Read
via "Threatpost".
Threat Post
Critical Remote Code Execution Flaw Found in Open Source rConfig Utility
The network configuration management utility has two unpatched critical remote code execution vulnerabilities.
β Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs β
π Read
via "Threatpost".
Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs -- and its operators' monetization abilities.π Read
via "Threatpost".
Threat Post
Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs
Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs β and its operators' monetization abilities.
π΄ Sumo Logic Buys JASK Labs to Tackle SOC Challenges π΄
π Read
via "Dark Reading: ".
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.π Read
via "Dark Reading: ".
Dark Reading
Sumo Logic Buys JASK Labs to Tackle SOC Challenges
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.
π΄ First Bluekeep Exploit Found in the Wild π΄
π Read
via "Dark Reading: ".
Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.π Read
via "Dark Reading: ".
Dark Reading
First Bluekeep Exploit Found in the Wild
Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.
β Apple developers β get this update to protect the rest of us! β
π Read
via "Naked Security".
Know any Apple developers? Make sure they're signed up to Apple's security advisories, and getting their developer updates.π Read
via "Naked Security".
Naked Security
Apple developers β get this update to protect the rest of us!
Know any Apple developers? Make sure theyβre signed up to Appleβs security advisories, and getting their developer updates.