π Cybercriminals using Google Analytics to enhance phishing efforts π
π Read
via "Security on TechRepublic".
A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals using Google Analytics to enhance phishing efforts
A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts.
π FBI, NIH Continue Biomed Research Theft Probe π
π Read
via "Subscriber Blog RSS Feed ".
A report in the New York Times this week revealed how widespread the theft of biomedical secrets is at U.S. universities and research institutions.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
FBI, NIH Continue Biomed Research Theft Probe
A report in the New York Times this week revealed how widespread the theft of biomedical secrets is at U.S. universities and research institutions.
π΄ Social Media: Corporate Cyber Espionage's Channel of Choice π΄
π Read
via "Dark Reading: ".
Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.π Read
via "Dark Reading: ".
Darkreading
Social Media: Corporate Cyber Espionage's Channel of Choice
Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.
ATENTIONβΌ New - CVE-2010-2471
π Read
via "National Vulnerability Database".
drupal6 version 6.16 has open redirectionπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-2446
π Read
via "National Vulnerability Database".
Rbot Reaction plugin allows command executionπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-2247
π Read
via "National Vulnerability Database".
makepasswd 1.10 default settings generate insecure passwordsπ Read
via "National Vulnerability Database".
π΄ What a Security Products Blacklist Means for End Users and Integrators π΄
π Read
via "Dark Reading: ".
A recent US Commerce Department blacklist of several Chinese entities leaves a looming question: What happens if your products are now prohibited?π Read
via "Dark Reading: ".
Dark Reading
What a Security Products Blacklist Means for End Users & Integrators
A recent US Commerce Department blacklist of several Chinese entities leaves a looming question: What happens if your products are now prohibited?
ATENTIONβΌ New - CVE-2009-5050
π Read
via "National Vulnerability Database".
konversation before 1.2.3 allows attackers to cause a denial of service.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5049
π Read
via "National Vulnerability Database".
WebApp JSP Snoop page XSS in jetty though 6.1.21.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5048
π Read
via "National Vulnerability Database".
Cookie Dump Servlet stored XSS vulnerability in jetty though 6.1.20.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5046
π Read
via "National Vulnerability Database".
JSP Dump and Session Dump Servlet XSS in jetty before 6.1.22.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5045
π Read
via "National Vulnerability Database".
Dump Servlet information leak in jetty before 6.1.22.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5043 (burn, debian_linux)
π Read
via "National Vulnerability Database".
burn allows file names to escape via mishandled quotation marksπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5042 (debian_linux, python-docutils)
π Read
via "National Vulnerability Database".
python-docutils allows insecure usage of temporary filesπ Read
via "National Vulnerability Database".
β Trend Micro: Rogue Employee Sold Customer Data for 68K Accounts β
π Read
via "Threatpost".
Trend Micro customers whose data was sold are getting scam calls from criminals purporting to be support staff.π Read
via "Threatpost".
Threat Post
Rogue Trend Micro Employee Sold Customer Data for 68K Accounts
Trend Micro customers whose data was sold are getting scam calls from criminals purporting to be support staff.
π΄ Google Announces App Defense Alliance π΄
π Read
via "Dark Reading: ".
The industry partnership will scan apps for malware before they're published on the Google Play Store.π Read
via "Dark Reading: ".
Dark Reading
Google Announces App Defense Alliance
The industry partnership will scan apps for malware before they're published on the Google Play Store.
π΄ Accounting Scams Continue to Bilk Businesses π΄
π Read
via "Dark Reading: ".
Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows - most often via e-mail - continue to enable big paydays.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Youβve Been Servedβ¦with Subpoena-Themed Phishing Emails β
π Read
via "Threatpost".
A targeted campaign is delivering an information-stealing malware called Predator the Thief.π Read
via "Threatpost".
Threat Post
Youβve Been Servedβ¦with Subpoena-Themed Phishing Emails
A targeted campaign is delivering an information-stealing malware called Predator the Thief.
β Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security β
π Read
via "Threatpost".
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.π Read
via "Threatpost".
Threat Post
Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.
β Warrant let police search online DNA database β
π Read
via "Naked Security".
This is a "game changer" when it comes to genetic privacy rights, experts say.π Read
via "Naked Security".
Naked Security
Warrant let police search online DNA database
This is a βgame changerβ when it comes to genetic privacy rights, experts say.
β Facebook scam steals famous faces and BBC branding β
π Read
via "Naked Security".
An email scam from earlier this year has resurfaced on Facebook - don't fall for it!π Read
via "Naked Security".
Naked Security
Facebook scam steals famous faces and BBC branding
An email scam from earlier this year has resurfaced on Facebook β donβt fall for it!