β Youβve Been Servedβ¦with Subpoena-Themed Phishing Emails β
π Read
via "Threatpost".
A targeted campaign is delivering an information-stealing malware called Predator the Thief.π Read
via "Threatpost".
Threat Post
Youβve Been Servedβ¦with Subpoena-Themed Phishing Emails
A targeted campaign is delivering an information-stealing malware called Predator the Thief.
β Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security β
π Read
via "Threatpost".
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.π Read
via "Threatpost".
Threat Post
Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.
β Warrant let police search online DNA database β
π Read
via "Naked Security".
This is a "game changer" when it comes to genetic privacy rights, experts say.π Read
via "Naked Security".
Naked Security
Warrant let police search online DNA database
This is a βgame changerβ when it comes to genetic privacy rights, experts say.
β Facebook scam steals famous faces and BBC branding β
π Read
via "Naked Security".
An email scam from earlier this year has resurfaced on Facebook - don't fall for it!π Read
via "Naked Security".
Naked Security
Facebook scam steals famous faces and BBC branding
An email scam from earlier this year has resurfaced on Facebook β donβt fall for it!
π΄ Black Hat Q&A: Hacking a '90s Sports Car π΄
π Read
via "Dark Reading: ".
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.π Read
via "Dark Reading: ".
Darkreading
Black Hat Q&A: Hacking a '90s Sports Car
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
π΄ Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group π΄
π Read
via "Dark Reading: ".
Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.π Read
via "Dark Reading: ".
Darkreading
Kaspersky Analysis Shines Light on DarkUniverse APT Group
Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.
β Facebook confesses 100 devs may have accessed leaked Groups data β
π Read
via "Naked Security".
It shut down that access in April 2018, or at least thought it did. At least 11 improperly accessed data in the last two months.π Read
via "Naked Security".
Naked Security
Facebook confesses 100 devs may have accessed leaked Groups data
It shut down that access in April 2018, or at least thought it did. At least 11 improperly accessed data in the last two months.
β Google Enlists Help to Fight Bad Android Apps β
π Read
via "Threatpost".
After years of unsuccessfully battling malware and bad apps in the Google Play store and on more than 2.5 billion Android devices, Google is finally doing something about it. The tech giant this week unveiled an alliance with three companies with specific expertise in endpoint security to help prevent the spread of malware on its [β¦]π Read
via "Threatpost".
Threat Post
Google Enlists Help to Fight Bad Android Apps
After years of unsuccessfully battling malware and bad apps in the Google Play store and on more than 2.5 billion Android devices, Google is finally doing something about it. The tech giant this week unveiled an alliance with three companies with specificβ¦
β Pilot presses the wrong button, triggers airport hostage alarm β
π Read
via "Naked Security".
We've all been there - faced with a button that is just begging to be pressed...π Read
via "Naked Security".
Naked Security
Pilot presses the wrong button, triggers airport hostage alarm
Weβve all been there β faced with a button that is just begging to be pressedβ¦
β Linux users warned to update libarchive to beat flaw β
π Read
via "Naked Security".
The bug is identified as CVE-2019-18408, a high-priority βuse-after-freeβ bug when dealing with a failed archive.π Read
via "Naked Security".
Naked Security
Linux users warned to update libarchive to beat flaw
The bug is identified as CVE-2019-18408, a high-priority βuse-after-freeβ bug when dealing with a failed archive.
β Data Breach Fines: Are They Working to Boost Consumer Safety? β
π Read
via "Threatpost".
Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.π Read
via "Threatpost".
Threat Post
Why Big Breach Fines Donβt Equal Fewer Breaches
Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.
β WordPress sites hit by malvertising β
π Read
via "Naked Security".
An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.π Read
via "Naked Security".
Naked Security
WordPress sites hit by malvertising
An old piece of malware is storming the WordPress community, enabling its perpetrators to take control of sites and inject code of their choosing.
π You've got malware: Malicious actors are waiting in your inbox π
π Read
via "Security on TechRepublic".
Dangerous URL messages, the resurgence of Emotet, and banking trojans flood the cyberthreat landscape, Proofpoint found.π Read
via "Security on TechRepublic".
TechRepublic
You've got malware: Malicious actors are waiting in your inbox
Dangerous URL messages, the resurgence of Emotet, and banking trojans flood the cyberthreat landscape, Proofpoint found.
π IBM social engineer easily hacked two journalists' information π
π Read
via "Security on TechRepublic".
A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.π Read
via "Security on TechRepublic".
TechRepublic
IBM social engineer easily hacked two journalists' information
A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.
β How to Secure Critical Infrastructure When Patching Isnβt Possible β
π Read
via "Threatpost".
Mission-critical systems can't just be switched off to apply security updates -- so patching can take weeks if not years.π Read
via "Threatpost".
Threat Post
How to Secure Critical Infrastructure When Patching Isnβt Possible
By Amir Levintal Cyberattacks are on the rise and threatening our digital life and our most intimate information β but also our operational realities. Attacks on critical infrastructure such as power plants, water works, airports and the like (transportationβ¦
π΄ The Cold Truth about Cyber Insurance π΄
π Read
via "Dark Reading: ".
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.π Read
via "Dark Reading: ".
Darkreading
The Cold Truth about Cyber Insurance
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.
π Travesty 1.0 π
π Go!
via "Security Tool Files β Packet Storm".
Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Travesty 1.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β S2 Ep16: BlueKeep, ransomware and sextortion β Naked Security Podcast β
π Read
via "Naked Security".
BlueKeep's back, ransomware batters Spain, and yet more sextortion - listen now!π Read
via "Naked Security".
Naked Security
S2 Ep16: BlueKeep, ransomware and sextortion β Naked Security Podcast
BlueKeepβs back, ransomware batters Spain, and yet more sextortion β listen now!
β Gamers Hit with Nvidia GPU Driver, GeForce Flaws β
π Read
via "Threatpost".
Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.π Read
via "Threatpost".
Threat Post
Gamers Hit with Nvidia GPU Driver, GeForce Flaws
Vulnerabilities in several PC gaming products offered by Nvidia can lead to escalation of privilege, denial of service and other malicious attacks.
π How can you protect yourself from hackers? An IBM social engineer offers advice π
π Read
via "Security on TechRepublic".
Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.π Read
via "Security on TechRepublic".
TechRepublic
How can you protect yourself from hackers? An IBM social engineer offers advice
Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works.
π How a hacker at IBM uses disguises and devices to steal private information π
π Read
via "Security on TechRepublic".
An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.π Read
via "Security on TechRepublic".
TechRepublic
How a hacker at IBM uses disguises and devices to steal private information
An IBM X-Force Red team member explains how her background in makeup and sales helps her social engineering career. Also, she demonstrates how cybercriminals can easily clone your work ID badge.