β Gnip Banking Trojan Shows Ongoing, Aggressive Development β
π Read
via "Threatpost".
The mobile malware, which incorporates Anubis source code, could evolve into a fully fledged spyware in the future.π Read
via "Threatpost".
Threat Post
Gnip Banking Trojan Shows Ongoing, Aggressive Development
The mobile malware, which incorporates Anubis source code, could evolve into a fully fledged spyware in the future.
β Linux Webmin Servers Under Attack by Roboto P2P Botnet β
π Read
via "Threatpost".
A newly-discovered peer-to-peer (P2P) botnet has been found targeting a remote code execution vulnerability in Linux Webmin servers.π Read
via "Threatpost".
Threat Post
Linux Webmin Servers Under Attack by Roboto P2P Botnet
A newly-discovered peer-to-peer (P2P) botnet has been found targeting a remote code execution vulnerability in Webmin Linux servers.
π 75% of developers worry about app security, but half lack dedicated security experts on their team π
π Read
via "Security on TechRepublic".
The majority of developers view security as integral to the coding and development process, but lack the support of a security expert, Whitehat Security found.π Read
via "Security on TechRepublic".
TechRepublic
75% of developers worry about app security, but half lack dedicated security experts on their team
The majority of developers view security as integral to the coding and development process, but lack the support of a security expert, Whitehat Security found.
ATENTIONβΌ New - CVE-2009-5047 (debian_linux, jetty)
π Read
via "National Vulnerability Database".
Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a "java.lang.NumberFormatException" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The same attack in 1) can be exploited by requesting a page using an HTTP request "Content-Length" header set to a letteral string.π Read
via "National Vulnerability Database".
π΄ Google Increases Top Android Hacking Prize to $1M π΄
π Read
via "Dark Reading: ".
Google expands its Android Security Rewards program and multiplies its top cash prize from $200,000 to $1 million.π Read
via "Dark Reading: ".
Dark Reading
Google Increases Top Android Hacking Prize to $1M
Google expands its Android Security Rewards program and multiplies its top cash prize from $200,000 to $1 million.
π΄ 3 Fundamentals for Better Security and IT Management π΄
π Read
via "Dark Reading: ".
Nail these security fundamentals, and your organization will be well-positioned to succeed next year and in the years to come.π Read
via "Dark Reading: ".
Darkreading
3 Fundamentals for Better Security and IT Management
Nail these security fundamentals, and your organization will be well-positioned to succeed next year and in the years to come.
β Microsoft Outlook for Android Bug Opens Door to XSS β
π Read
via "Threatpost".
Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks.π Read
via "Threatpost".
Threat Post
Microsoft Outlook for Android Bug Opens Door to XSS
Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks.
π Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it π
π Read
via "Security on TechRepublic".
Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).π Read
via "Security on TechRepublic".
TechRepublic
Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it
Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).
π Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it π
π Read
via "Security on TechRepublic".
Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).π Read
via "Security on TechRepublic".
TechRepublic
Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it
Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).
π΄ In the Market for a MSSP? Ask These Questions First π΄
π Read
via "Dark Reading: ".
Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.π Read
via "Dark Reading: ".
Dark Reading
In the Market for a MSSP? Ask These Questions First
Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.
π΄ Government Agency Partners on New Tool for Election Security π΄
π Read
via "Dark Reading: ".
The Cybersecurity and Infrastructure Security Agency has partnered with VotingWorks on an open source tool to aid election result audits.π Read
via "Dark Reading: ".
Dark Reading
Government Agency Partners on New Tool for Election Security
The Cybersecurity and Infrastructure Security Agency has partnered with VotingWorks on an open source tool to aid election result audits.
β Senators Demand Amazon Disclose Ring Privacy Policies β
π Read
via "Threatpost".
Amazon's Ring data collection policies are in the spotlight.π Read
via "Threatpost".
Threat Post
Senators Demand Amazon Disclose Ring Privacy Policies
Amazon's Ring data collection policies are in the spotlight.
π΄ Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities π΄
π Read
via "Dark Reading: ".
The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.π Read
via "Dark Reading: ".
Darkreading
Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities
The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.
β Convicted Nigerian fraudster keeps a-fraudinβ from behind bars β
π Read
via "Naked Security".
He was supposed to be serving a 24-year sentence in the "maximum security" prison, not continuing the fraud... and going to parties.π Read
via "Naked Security".
Naked Security
Convicted Nigerian fraudster keeps a-fraudinβ from behind bars
He was supposed to be serving a 24-year sentence in the βmaximum securityβ prison, not continuing the fraudβ¦ and going to parties.
β Why do cryptocurrency scams work and how do you avoid them? β
π Read
via "Naked Security".
What are ICOs, why are they so popular and why do crooks love them so much?π Read
via "Naked Security".
Naked Security
Why cryptocoin scams work, and how to avoid them
What are ICOs, why are they so popular and why do crooks love them so much?
β Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip β
π Read
via "Threatpost".
The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.π Read
via "Threatpost".
Threat Post
Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip
The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.
β News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws β
π Read
via "Threatpost".
From stalkerware to Amazon Ring doorbell outrage, Threatpost editors break down the top news stories of the week.π Read
via "Threatpost".
Threat Post
News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws
From stalkerware to Amazon Ring doorbell outrage, Threatpost editors break down the top news stories of the week.
β Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways β
π Read
via "Threatpost".
Financial institutions are in the crosshairs of hackers leveraging the malware to steal sensitive data.π Read
via "Threatpost".
Threat Post
Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways
Financial institutions are in the crosshairs of hackers leveraging the malware to steal sensitive data.
β Iranβs APT33 sharpens focus on industrial control systems β
π Read
via "Naked Security".
Iran's elite hacking group is upping its game, according to new evidence delivered at a cybersecurity conference this week.π Read
via "Naked Security".
Naked Security
Iranβs APT33 sharpens focus on industrial control systems
Iranβs elite hacking group is upping its game, according to new evidence delivered at a cybersecurity conference this week.
β Google plans to take Android back to βmainlineβ Linux kernel β
π Read
via "Naked Security".
Android could be returning to its roots.π Read
via "Naked Security".
Naked Security
Google plans to take Android back to βmainlineβ Linux kernel
Android could be returning to its roots.