β Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs β
π Read
via "Threatpost".
Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs -- and its operators' monetization abilities.π Read
via "Threatpost".
Threat Post
Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs
Wake-on-LAN and ARP pinging have expanded Ryuk's reach into corporate LANs β and its operators' monetization abilities.
π΄ Sumo Logic Buys JASK Labs to Tackle SOC Challenges π΄
π Read
via "Dark Reading: ".
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.π Read
via "Dark Reading: ".
Dark Reading
Sumo Logic Buys JASK Labs to Tackle SOC Challenges
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.
π΄ First Bluekeep Exploit Found in the Wild π΄
π Read
via "Dark Reading: ".
Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.π Read
via "Dark Reading: ".
Dark Reading
First Bluekeep Exploit Found in the Wild
Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.
β Apple developers β get this update to protect the rest of us! β
π Read
via "Naked Security".
Know any Apple developers? Make sure they're signed up to Apple's security advisories, and getting their developer updates.π Read
via "Naked Security".
Naked Security
Apple developers β get this update to protect the rest of us!
Know any Apple developers? Make sure theyβre signed up to Appleβs security advisories, and getting their developer updates.
π Donβt Believe the FUD from the DLP Wannabes: Digital Guardian Supports macOS π
π Read
via "Subscriber Blog RSS Feed ".
π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Donβt Believe the FUD from the DLP Wannabes: Digital Guardian Supports macOS
β Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam β
π Read
via "Threatpost".
Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.π Read
via "Threatpost".
Threat Post
Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam
Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.
ATENTIONβΌ New - CVE-2005-4890
π Read
via "National Vulnerability Database".
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.π Read
via "National Vulnerability Database".
β Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy β
π Read
via "Threatpost".
Stealing payment-card data and PII from e-commerce sites has become so lucrative that some are being targeted by multiple groups at the same time.π Read
via "Threatpost".
Threat Post
Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy
Stealing payment-card data and PII from e-commerce sites has become so lucrative that some are being targeted by multiple groups at the same time.
π΄ Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019 π΄
π Read
via "Dark Reading: ".
New tools and updates aimed at addressing ongoing challenges with insider threats and sensitive data classification.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2010-3662
π Read
via "National Vulnerability Database".
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows SQL Injection on the backend.π Read
via "National Vulnerability Database".
π΄ Microsoft Security Setting Ironically Increases Risks for Office for Mac Users π΄
π Read
via "Dark Reading: ".
Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.π Read
via "Dark Reading: ".
Darkreading
Microsoft Security Setting Ironically Increases Risks for Office for Mac Users
Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.
β Police interrogate Alexa for clues in fatal spear-stabbing β
π Read
via "Naked Security".
A friend heard a couple arguing but couldn't make out what it was about. Police hope that Alexa might have a better idea.π Read
via "Naked Security".
Naked Security
Police interrogate Alexa for clues in fatal spear-stabbing
A friend heard a couple arguing but couldnβt make out what it was about. Police hope that Alexa might have a better idea.
β Eye Clinic Breach Reveals Data of 20,000 Patients β
π Read
via "Threatpost".
Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.π Read
via "Threatpost".
Threat Post
Eye Clinic Breach Reveals Data of 20,000 Patients
Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.
β Florida city sends $742K to fraudsters as it bites the BEC hook β
π Read
via "Naked Security".
βHere's our new bank account number,β the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.π Read
via "Naked Security".
Naked Security
Florida city sends $742K to fraudsters as it bites the BEC hook
βHereβs our new bank account number,β the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.
β Google patches bug that let nearby hackers send malware to your phone β
π Read
via "Naked Security".
Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim's phoneπ Read
via "Naked Security".
Naked Security
Google patches bug that let nearby hackers send malware to your phone
Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victimβs phone
π΄ Enterprise Web Security: Risky Business π΄
π Read
via "Dark Reading: ".
Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.π Read
via "Dark Reading: ".
Dark Reading
Enterprise Web Security: Risky Business
Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.
π Top 5 additional ways to fend off ransomware π
π Read
via "Security on TechRepublic".
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.π Read
via "Security on TechRepublic".
β Trump, Putin and Politics Name-Dropped to Peddle Malware β
π Read
via "Threatpost".
Cybercriminals are leveraging political names and figures for social engineering as the elections loom.π Read
via "Threatpost".
Threat Post
Trump, Putin and Politics Name-Dropped to Peddle Malware
Cybercriminals are leveraging political names and figures for social engineering as the elections loom.
π Top 5 additional ways to fend off ransomware π
π Read
via "Security on TechRepublic".
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 additional ways to fend off ransomware
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.
ATENTIONβΌ New - CVE-2010-0737 (jboss_operations_network)
π Read
via "National Vulnerability Database".
A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-0398 (autokey)
π Read
via "National Vulnerability Database".
The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.π Read
via "National Vulnerability Database".