ATENTIONβΌ New - CVE-2013-0293
π Read
via "National Vulnerability Database".
oVirt Node: Lock screen accepts F2 to drop to shell causing privilege escalationπ Read
via "National Vulnerability Database".
π TOR Virtual Network Tunneling Tool 0.4.2.5 π
π Go!
via "Security Tool Files β Packet Storm".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.2.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Download: The 2020 Cybersecurity Salary Survey Results β
π Read
via "Threatpost".
Today you can access the aggregated and analyzed 2020 Cybersecurity Salary Survey Results and gain insight into the main ranges and factors of current cybersecurity salaries.π Read
via "Threatpost".
Threat Post
Download: The 2020 Cybersecurity Salary Survey Results
Today you can access the aggregated and analyzed 2020 Cybersecurity Salary Survey Results and gain insight into the main ranges and factors of current cybersecurity salaries.
β Amazonβs Blink Smart Security Cameras Open to Hijack β
π Read
via "Threatpost".
Amazon is rolling out patches for the vulnerabilities and users are urged to confirm their device is updated to firmware version 2.13.11 or later.π Read
via "Threatpost".
Threat Post
Amazonβs Blink Smart Security Cameras Open to Hijack
Amazon is rolling out patches for the vulnerabilities and users are urged to confirm their device is updated to firmware version 2.13.11 or later.
π΄ Only 53% of Security Pros Have Ownership of Workforce IAM π΄
π Read
via "Dark Reading: ".
Most practitioners report an increase in identities, but many don't have control over how those identities are protected from a range of attacks.π Read
via "Dark Reading: ".
Dark Reading
Only 53% of Security Pros Have Ownership of Workforce IAM
Most practitioners report an increase in identities, but many don't have control over how those identities are protected from a range of attacks.
β Adobe Fixes 17 Critical Acrobat, Photoshop and Brackets Flaws β
π Read
via "Threatpost".
The patches are part of Adobe's regularly-scheduled fixes.π Read
via "Threatpost".
Threat Post
Adobe Fixes 17 Critical Acrobat, Photoshop and Brackets Flaws
The patches are part of Adobe's regularly-scheduled fixes.
β Snatch Team Steals Data and Hammers Orgs with Ransomware β
π Read
via "Threatpost".
Snatch has burst on the scene, featuring an array of executables and tools for carrying out carefully orchestrated attacks.π Read
via "Threatpost".
Threat Post
Snatch Team Steals Data and Hammers Orgs with Ransomware
Snatch has burst on the scene, featuring an array of executables and tools for carrying out carefully orchestrated attacks.
π How to protect your organization against the Snatch ransomware threat π
π Read
via "Security on TechRepublic".
Discovered and analyzed by security provider Sophos, Snatch attempts to bypass traditional security software by rebooting your PC into Safe Mode.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your organization against the Snatch ransomware threat
Discovered and analyzed by security provider Sophos, Snatch attempts to bypass traditional security software by rebooting your PC into Safe Mode.
π Mac Deploy Stick 2.0: Benefits of the free MDM for macOS π
π Read
via "Security on TechRepublic".
MDS 2.0 helps admins modernize their workflow and deploy Apple hardware and software. Also, this Mac deployment utility is free.π Read
via "Security on TechRepublic".
TechRepublic
Mac Deploy Stick 2.0: Benefits of the free MDM for macOS
MDS 2.0 helps admins modernize their workflow and deploy Apple hardware and software. Also, this Mac deployment utility is free.
π How to use the Firefox Lockwise password manager π
π Read
via "Security on TechRepublic".
Mozilla has evolved its Lockbox password tool into a more standard password manager. Find out if Firefox Lockwise is right for you.π Read
via "Security on TechRepublic".
TechRepublic
How to use the Firefox Lockwise password manager
Mozilla has evolved its Lockbox password tool into a more standard password manager. Find out if Firefox Lockwise is right for you.
π΄ Intel's CPU Flaws Continue to Create Problems for the Tech Community π΄
π Read
via "Dark Reading: ".
We can't wait out this problem and hope that it goes away. We must be proactive.π Read
via "Dark Reading: ".
Dark Reading
Intel's CPU Flaws Continue to Create Problems for the Tech Community
We can't wait out this problem and hope that it goes away. We must be proactive.
β Cyberattack Downs Pensacolaβs City Systems β
π Read
via "Threatpost".
The cyberattack comes days after a shooting at U.S. military base Naval Air Station Pensacola rocked the city.π Read
via "Threatpost".
Threat Post
Cyberattack Downs Pensacolaβs City Systems
The cyberattack comes days after a shooting at U.S. military base Naval Air Station Pensacola rocked the city.
π΄ Security 101: What Is a Man-in-the-Middle Attack? π΄
π Read
via "Dark Reading: ".
A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.π Read
via "Dark Reading: ".
Dark Reading
Security 101: What Is a Man-in-the-Middle Attack?
A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.
π΄ Blink Cameras Found with Multiple Vulnerabilities π΄
π Read
via "Dark Reading: ".
Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.π Read
via "Dark Reading: ".
Dark Reading
Blink Cameras Found with Multiple Vulnerabilities
Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.
π Executive Stole Trade Secrets, Then Lied About It π
π Read
via "Subscriber Blog RSS Feed ".
In a lawsuit filed last week, the company claims the ex-executive stole and retained confidential and trade secret data and lied to cover it up.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Executive Stole Trade Secrets, Then Lied About It
In a lawsuit filed last week, the company claims the ex-executive stole and retained confidential and trade secret data and lied to cover it up.
β Microsoft Zaps Actively Exploited Zero-Day Bug β
π Read
via "Threatpost".
December 2019's relatively light Patch Tuesday update also fixes seven critical flaws.π Read
via "Threatpost".
Threat Post
Microsoft Zaps Actively Exploited Zero-Day Bug
December 2019's relatively light Patch Tuesday update also fixes seven critical flaws.
ATENTIONβΌ New - CVE-2012-5620
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-1577
π Read
via "National Vulnerability Database".
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.π Read
via "National Vulnerability Database".
π Your open source gift giving guide for 2019 π
π Read
via "Security on TechRepublic".
'Tis the season for open source gifts. But what to buy? Jack Wallen has a few ideas that are sure to put a smile on the faces of the open source lovers in your life.π Read
via "Security on TechRepublic".
TechRepublic
Your open source gift giving guide for 2019
'Tis the season for open source gifts. But what to buy? Jack Wallen has a few ideas that are sure to put a smile on the faces of the open source lovers in your life.
π΄ Microsoft Fixes Windows Zero-Day on Lightest Patch Tuesday of 2019 π΄
π Read
via "Dark Reading: ".
This month's batch of security updates addresses 36 CVEs, seven of which are rated Critical and one of which has been exploited in the wild.π Read
via "Dark Reading: ".
Darkreading
Microsoft Fixes Windows Zero-Day on Lightest Patch Tuesday of 2019
This month's batch of security updates addresses 36 CVEs, seven of which are rated Critical and one of which has been exploited in the wild.
π΄ Data Leak Week: Billions of Sensitive Files Exposed Online π΄
π Read
via "Dark Reading: ".
A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.π Read
via "Dark Reading: ".
Dark Reading
Data Leak Week: Billions of Sensitive Files Exposed Online
A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.