ATENTIONβΌ New - CVE-2012-2130
π Read
via "National Vulnerability Database".
A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2092
π Read
via "National Vulnerability Database".
A Security Bypass vulnerability exists in Ubuntu Cobbler before 2,2,2 in the cobbler-ubuntu-import script due to an error when verifying the GPG signature.π Read
via "National Vulnerability Database".
π΄ How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC π΄
π Read
via "Dark Reading: ".
Money meant to fund an Israeli startup wound up directly deposited to the scammers.π Read
via "Dark Reading: ".
Dark Reading
How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC
Money meant to fund an Israeli startup wound up directly deposited to the scammers.
β Email Voted a Weak Link for Election Security, with DMARC Lagging β
π Read
via "Threatpost".
Most counties are not protected from impersonation-based spearphishing attacks.π Read
via "Threatpost".
Threat Post
Email Voted a Weak Link for Election Security, with DMARC Lagging
Most counties are not protected from impersonation-based spearphishing attacks.
β Monday review β the hot 22 stories of the week β
π Read
via "Naked Security".
Get up to date with the hot security stories from the past week - from fake Android apps to malware targeting Mac users.π Read
via "Naked Security".
Naked Security
Monday review β the hot 22 stories of the week
Get up to date with the hot security stories from the past week β from fake Android apps to malware targeting Mac users.
β $5m bounty set on the alleged head of Evil Corp banking Trojan group β
π Read
via "Naked Security".
Know where Maksim βAquaβ Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!π Read
via "Naked Security".
Naked Security
$5m bounty set on the alleged head of Evil Corp banking Trojan group
Know where Maksim βAquaβ Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!
β Facebook suing ILikeAd for hijacking usersβ ad accounts β
π Read
via "Naked Security".
Facebook says the company used celeb bait links to infect victims with malware and hijacked their ad accounts to sell diet pills.π Read
via "Naked Security".
Naked Security
Facebook suing ILikeAd for hijacking usersβ ad accounts
Facebook says the company used celeb bait links to infect victims with malware and hijacked their ad accounts to sell diet pills.
β HackerOne pays $20,000 bounty after breach of own systems β
π Read
via "Naked Security".
In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff duringβ¦ a bug submission.π Read
via "Naked Security".
Naked Security
HackerOne pays $20,000 bounty after breach of own systems
In an embarrassing twist, bug bounty platform HackerOne has paid a $20,000 reward to a researcher who reported a security flaw inadvertently caused by one of its staff during⦠a bug submission.
β Networking attack gives hijackers VPN access β
π Read
via "Naked Security".
Researchers have discovered a flaw in macOS, Linux, and several other operating systems that could let attackers hijack VPN connections.π Read
via "Naked Security".
Naked Security
Networking attack gives hijackers VPN access
Researchers have discovered a flaw in macOS, Linux, and several other operating systems that could let attackers hijack VPN connections.
π΄ New: From the Core to the Edge: 7 Reasons You Need Security at the Edge π΄
π Read
via "Dark Reading: ".
No longer can you secure the perimeter and trust that nothing will get in or out.π Read
via "Dark Reading: ".
Dark Reading
The Edge
No longer can you secure the perimeter and trust that nothing will get in or out.
β Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade Documents β
π Read
via "Threatpost".
The platform has linked documents posted on its site to a vote-manipulation campaign already observed on Facebook earlier this year.π Read
via "Threatpost".
Threat Post
Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade Documents
The platform has linked documents posted on its site to a vote-manipulation campaign already observed on Facebook earlier this year.
π΄ 4 Tips to Run Fast in the Face of Digital Transformation π΄
π Read
via "Dark Reading: ".
This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.π Read
via "Dark Reading: ".
Darkreading
4 Tips to Run Fast in the Face of Digital Transformation
This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.
β GE, Dunkinβ, Forever 21 Caught Up in Broad Internal Document Leak β
π Read
via "Threatpost".
A PR and marketing provider exposed sensitive data for a raft of big-name companies.π Read
via "Threatpost".
Threat Post
GE, Dunkinβ, Forever 21 Caught Up in Broad Internal Document Leak
A PR and marketing provider exposed sensitive data for a raft of big-name companies.
π DroneSploit Black Hat Europe 2019 Release π
π Go!
via "Security Tool Files β Packet Storm".
DroneSploit is a CLI framework that is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
DroneSploit Black Hat Europe 2019 Release β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π GNU Privacy Guard 2.2.19 π
π Go!
via "Security Tool Files β Packet Storm".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
GNU Privacy Guard 2.2.19 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Criminals Hide Fraud Behind the Green Lock Icon π΄
π Read
via "Dark Reading: ".
Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.π Read
via "Dark Reading: ".
Dark Reading
Criminals Hide Fraud Behind the Green Lock Icon
Criminals are using free certificate services to apply real security certs to fraudulent sites - and to take advantage of victims looking for surfing safety.
π΄ Nation-State Attackers May Have Co-opted Vega Ransomware π΄
π Read
via "Dark Reading: ".
The tactics used by the latest version of the Vega cryptolocker program indicates the code may have been stolen from its authors and is now being used for destructive attacks, a new report suggests.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Will the new iPhone 11 track you even if you tell it not to? β
π Read
via "Naked Security".
Does turning location access off for all your apps mean that location access is off altogether?π Read
via "Naked Security".
Naked Security
Will the new iPhone 11 track you even if you tell it not to?
Does turning location access off for all your apps mean that location access is off altogether?
π΄ 10 Notable Cybersecurity Acquisitions of 2019, Part 2 π΄
π Read
via "Dark Reading: ".
As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.π Read
via "Dark Reading: ".
Dark Reading
10 Notable Cybersecurity Acquisitions of 2019, Part 2
As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.
β Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game Loot β
π Read
via "Threatpost".
A phishing attack is masquerading as messages from the game's developers.π Read
via "Threatpost".
Threat Post
Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game Loot
A phishing attack is masquerading as messages from the game's developers.
π΄ Two Bayrob Cybercrime Members Sentenced to 20 and 18 Years in Prison π΄
π Read
via "Dark Reading: ".
The Romanian nationals stole some $4 million in a vast malware, botnet, and cryptocurrency operation.π Read
via "Dark Reading: ".
Darkreading
Two Bayrob Cybercrime Members Sentenced to 20 and 18 Years in Prison
The Romanian nationals stole some $4 million in a vast malware, botnet, and cryptocurrency operation.