ATENTIONβΌ New - CVE-2010-3662
π Read
via "National Vulnerability Database".
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows SQL Injection on the backend.π Read
via "National Vulnerability Database".
π΄ Microsoft Security Setting Ironically Increases Risks for Office for Mac Users π΄
π Read
via "Dark Reading: ".
Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.π Read
via "Dark Reading: ".
Darkreading
Microsoft Security Setting Ironically Increases Risks for Office for Mac Users
Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.
β Police interrogate Alexa for clues in fatal spear-stabbing β
π Read
via "Naked Security".
A friend heard a couple arguing but couldn't make out what it was about. Police hope that Alexa might have a better idea.π Read
via "Naked Security".
Naked Security
Police interrogate Alexa for clues in fatal spear-stabbing
A friend heard a couple arguing but couldnβt make out what it was about. Police hope that Alexa might have a better idea.
β Eye Clinic Breach Reveals Data of 20,000 Patients β
π Read
via "Threatpost".
Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.π Read
via "Threatpost".
Threat Post
Eye Clinic Breach Reveals Data of 20,000 Patients
Incident that exposed emails to a PayPal scam once again highlights the persistent nature of third-party security risk.
β Florida city sends $742K to fraudsters as it bites the BEC hook β
π Read
via "Naked Security".
βHere's our new bank account number,β the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.π Read
via "Naked Security".
Naked Security
Florida city sends $742K to fraudsters as it bites the BEC hook
βHereβs our new bank account number,β the scammers said. When the real construction firm sent their invoice, payment was made to the crooks.
β Google patches bug that let nearby hackers send malware to your phone β
π Read
via "Naked Security".
Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim's phoneπ Read
via "Naked Security".
Naked Security
Google patches bug that let nearby hackers send malware to your phone
Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victimβs phone
π΄ Enterprise Web Security: Risky Business π΄
π Read
via "Dark Reading: ".
Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.π Read
via "Dark Reading: ".
Dark Reading
Enterprise Web Security: Risky Business
Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.
π Top 5 additional ways to fend off ransomware π
π Read
via "Security on TechRepublic".
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.π Read
via "Security on TechRepublic".
β Trump, Putin and Politics Name-Dropped to Peddle Malware β
π Read
via "Threatpost".
Cybercriminals are leveraging political names and figures for social engineering as the elections loom.π Read
via "Threatpost".
Threat Post
Trump, Putin and Politics Name-Dropped to Peddle Malware
Cybercriminals are leveraging political names and figures for social engineering as the elections loom.
π Top 5 additional ways to fend off ransomware π
π Read
via "Security on TechRepublic".
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 additional ways to fend off ransomware
In 2019, 23 city governments in Texas experienced a coordinated ransomware attack. Tom Merritt explains how they defended themselves and ways you can protect your own business.
ATENTIONβΌ New - CVE-2010-0737 (jboss_operations_network)
π Read
via "National Vulnerability Database".
A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-0398 (autokey)
π Read
via "National Vulnerability Database".
The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.π Read
via "National Vulnerability Database".
β Office for Mac 2011 users warned about SYLK file format β
π Read
via "Naked Security".
Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.π Read
via "Naked Security".
Naked Security
Office for Mac 2011 users warned about SYLK file format
Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.
π΄ Proofpoint Acquires ObserveIT to Bolster DLP Capabilities π΄
π Read
via "Dark Reading: ".
The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.π Read
via "Dark Reading: ".
Dark Reading
Proofpoint Acquires ObserveIT to Bolster DLP Capabilities
The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.
π How Microsoft and Digital Guardian Help Protect Your Sensitive Data π
π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian, through its integration with Microsoft Information Protection, helps enrich Microsoftβs data loss prevention capabilities.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
How Microsoft and Digital Guardian Help Protect Your Sensitive Data
Digital Guardian, through its integration with Microsoft, helps extend the value of Microsoft Information Protection capabilities.
π How boot camps may fill the need for more white hats in the US π
π Read
via "Security on TechRepublic".
New study: 3 in 5 have experienced discrimination in the workplaceπ Read
via "Security on TechRepublic".
TechRepublic
How boot camps may fill the need for more white hats in the US
New study: 3 in 5 have experienced discrimination in the workplace
π How boot camps may fill the need for more white hats in the US π
π Read
via "Security on TechRepublic".
Cyberspace is the fifth domain of warfare, yet there is a critical shortage of security experts ready to combat cybercrime.π Read
via "Security on TechRepublic".
TechRepublic
How boot camps may fill the need for more white hats in the US
Cyberspace is the fifth domain of warfare, yet there is a critical shortage of security experts ready to combat cybercrime.
π΄ The State of Email Security and Protection π΄
π Read
via "Dark Reading: ".
Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.π Read
via "Dark Reading: ".
Darkreading
The State of Email Security and Protection
Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.
π΄ 10 Tips for Building Compliance by Design into Cloud Architecture π΄
π Read
via "Dark Reading: ".
A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks' mobile app.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π΄ Disclosure Does Little to Dissuade Cyber Spies π΄
π Read
via "Dark Reading: ".
In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.π Read
via "Dark Reading: ".
Darkreading
Disclosure Does Little to Dissuade Cyber Spies
In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.
π΄ The Edge Cartoon Contest: Need a Lift? π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
The Edge
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.