ATENTIONβΌ New - CVE-2008-7272 (firegpg)
π Read
via "National Vulnerability Database".
FireGPG before 0.6 handle user?s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a users?s private key.π Read
via "National Vulnerability Database".
π΄ 8 Backup & Recovery Questions to Ask Yourself π΄
π Read
via "Dark Reading: ".
Don't wait until after a disaster, DDoS, or ransomware attack to learn just how good your backups really are.π Read
via "Dark Reading: ".
Dark Reading
8 Backup & Recovery Questions to Ask Yourself
Don't wait until after a disaster, DDoS, or ransomware attack to learn just how good your backups really are.
π New phishing email campaign impersonates US postal service to deliver malware π
π Read
via "Security on TechRepublic".
The same threat actor has been observed targeting companies in the US, Italy, and Germany, according to a new report from security provider Proofpoint.π Read
via "Security on TechRepublic".
TechRepublic
New phishing email campaign impersonates US postal service to deliver malware
The same threat actor has been observed targeting companies in the US, Italy, and Germany, according to a new report from security provider Proofpoint.
π΄ US-CERT Warns of Remotely Exploitable Bugs in Medical Devices π΄
π Read
via "Dark Reading: ".
Vulnerabilities in key surgical equipment could be remotely exploited by a low-skill attacker.π Read
via "Dark Reading: ".
Dark Reading
US-CERT Warns of Remotely Exploitable Bugs in Medical Devices
Vulnerabilities in key surgical equipment could be remotely exploited by a low-skill attacker.
β Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns β
π Read
via "Threatpost".
Now that the checkm8 BootROM vulnerability has a working exploit, security pros are warning of potential attacks.π Read
via "Threatpost".
Threat Post
Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns
Now that the checkm8 BootROM vulnerability has a working exploit, security pros are warning of potential attacks.
ATENTIONβΌ New - CVE-2008-5083 (jboss_operations_network)
π Read
via "National Vulnerability Database".
In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.π Read
via "National Vulnerability Database".
π΄ 5 Cybersecurity CISO Priorities for the Future π΄
π Read
via "Dark Reading: ".
Seven chief information security officers share their pain points and two-year spending plans.π Read
via "Dark Reading: ".
Darkreading
5 Cybersecurity CISO Priorities for the Future
Seven chief information security officers share their pain points and two-year spending plans.
π΄ Attacks on Healthcare Jump 60% in 2019 - So Far π΄
π Read
via "Dark Reading: ".
Well-known Trojans Emotet and Trickbot are cybercriminals' favorite weapons in their campaigns.π Read
via "Dark Reading: ".
Darkreading
Attacks on Healthcare Jump 60% in 2019 - So Far
Well-known Trojans Emotet and Trickbot are cybercriminals' favorite weapons in their campaigns.
π Mastering DFIR: Tools and Processes to Analyze Forensic Data π
π Read
via "Subscriber Blog RSS Feed ".
In this post, the first of two blogs, Tim Bandos helps break down the DFIR tools and processes he uses to carry out investigations.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Mastering DFIR: Tools and Processes to Analyze Forensic Data
In this post, the first of two blogs, Tim Bandos helps break down the DFIR tools and processes he uses to carry out investigations.
π΄ Capture the Flag Planned to Find Missing Persons Information π΄
π Read
via "Dark Reading: ".
The competition, launched by SANS and Trace Labs, will put to use open source information in search of new clues.π Read
via "Dark Reading: ".
Dark Reading
Capture the Flag Planned to Find Missing Persons Information
The competition, launched by SANS and Trace Labs, will put to use open source information in search of new clues.
π΄ BSIMM10 Shows Industry Vertical Maturity π΄
π Read
via "Dark Reading: ".
The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve.π Read
via "Dark Reading: ".
Dark Reading
BSIMM10 Shows Industry Vertical Maturity
The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve.
π How to manage site settings in Vivaldi for Android π
π Read
via "Security on TechRepublic".
Find out how to enable or disable permissions on a site-by-site basis in the Vivaldi browser.π Read
via "Security on TechRepublic".
TechRepublic
How to manage site settings in Vivaldi for Android
Find out how to enable or disable permissions on a site-by-site basis in the Vivaldi browser.
π How to use per-host SSH configuration π
π Read
via "Security on TechRepublic".
Learn how to make your SSH use more efficient and convenient with per-host configurations.π Read
via "Security on TechRepublic".
TechRepublic
How to use per-host SSH configuration
Learn how to make your SSH use more efficient and convenient with per-host configurations.
π΄ I'm Setting Up My Company's First Bug-Bounty Program. What Should I Be Thinking About? π΄
π Read
via "Dark Reading: ".
Here are some important points to factor into your vulnerability disclosure policy.π Read
via "Dark Reading: ".
Dark Reading
I'm Setting Up My Company's First Bug-Bounty Program. What Should I Be Thinking About?
Here are some important points to factor into your vulnerability disclosure policy.
β Double Vision: Stealthy Malware Dropper Delivers Dual RATs β
π Read
via "Threatpost".
A lengthy, multi-stage infection process leads to a duo of payloads, bent on stealing data.π Read
via "Threatpost".
Threat Post
Double Vision: Stealthy Malware Dropper Delivers Dual RATs
A lengthy, multi-stage infection process leads to a duo of payloads, bent on stealing data.
π΄ I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About? π΄
π Read
via "Dark Reading: ".
Here are some important points to factor into your vulnerability disclosure policy.π Read
via "Dark Reading: ".
Dark Reading
I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About?
Here are some important points to factor into your vulnerability disclosure policy.
π΄ Symantec, McAfee Patch Privilege Escalation Bugs π΄
π Read
via "Dark Reading: ".
All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says.π Read
via "Dark Reading: ".
Dark Reading
Symantec, McAfee Patch Privilege Escalation Bugs
All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says.
β Apple fires employee after he texts customerβs pic to his own phone β
π Read
via "Naked Security".
An βEXTREMELY PERSONALβ, year-old pic, the woman said, that he had to scroll through 5,000 photos to get to. Police are investigating.π Read
via "Naked Security".
Naked Security
Apple fires employee after he texts customerβs pic to his own phone
An βEXTREMELY PERSONALβ, year-old pic, the woman said, that he had to scroll through 5,000 photos to get to. Police are investigating.
β Brave 1.0 launches, extends ad-watching payouts to iOS β
π Read
via "Naked Security".
It's showtime: Finally out of beta comes the browser that promises privacy, anonymity and cryptocurrency in exchange for your eyeballs.π Read
via "Naked Security".
Naked Security
Brave 1.0 launches, extends ad-watching payouts to iOS
Itβs showtime: Finally out of beta comes the browser that promises privacy, anonymity and cryptocurrency in exchange for your eyeballs.
β Data thieves blew cover after maxing out victimβs hard drive β
π Read
via "Naked Security".
The FTC has reached a settlement with InfoTrax after thieves stole a million sensitive customer records from its servers in 2016.π Read
via "Naked Security".
Naked Security
Data thieves blew cover after maxing out victimβs hard drive
The FTC has reached a settlement with InfoTrax after thieves stole a million sensitive customer records from its servers in 2016.
β How the Linux kernel balances the risks of public bug disclosure β
π Read
via "Naked Security".
A serious Wi-Fi flaw shows how Linux handles security in plain sight.π Read
via "Naked Security".
Naked Security
How the Linux kernel balances the risks of public bug disclosure
A serious Wi-Fi flaw shows how Linux handles security in plain sight.