β What a decade! Our baddest stories and biggest lessons, year by yearβ¦ β
π Read
via "Naked Security".
From the bizarre, through the crazy, all the way to the outright impossible - there's still plenty to learn from all of these stories.π Read
via "Naked Security".
Naked Security
What a decade! Our baddest stories and biggest lessons, year by yearβ¦
From the bizarre, through the crazy, all the way to the outright impossible β thereβs still plenty to learn from all of these stories.
π΄ IoT Security: How Far We've Come, How Far We Have to Go π΄
π Read
via "Dark Reading: ".
As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
IoT Security: How Far We've Come, How Far We Have to Go
As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.
β The Case for Cyber-Risk Prospectuses β
π Read
via "Threatpost".
Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.π Read
via "Threatpost".
Threat Post
The Case for Cyber-Risk Prospectuses
Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.
ATENTIONβΌ New - CVE-2017-16778
π Read
via "National Vulnerability Database".
An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel allows physical attackers to inject a Dual-Tone-Multi-Frequency (DTMF) tone to invoke an access grant that would allow physical access to a restricted floor/level. By design, only a residential unit owner may allow such an access grant. However, due to incorrect access control, an attacker could inject it via the speaker unit to perform an access grant to gain unauthorized access, as demonstrated by a loud DTMF tone representing '1' and a long '#' (697 Hz and 1209 Hz, followed by 941 Hz and 1477 Hz).π Read
via "National Vulnerability Database".
β Sextortionists return for Christmas β price goes down, threats go up β
π Read
via "Naked Security".
This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last week's version.π Read
via "Naked Security".
Naked Security
Sextortionists return for Christmas β price goes down, threats go up
This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last weekβs version.
β Biggest Malware Threats of 2019 β
π Read
via "Threatpost".
2019 was another banner year for bots, trojans, RATS and ransomware. Letβs take a look back.π Read
via "Threatpost".
Threat Post
Biggest Malware Threats of 2019
2019 was another banner year for bots, trojans, RATS and ransomware. Letβs take a look back.
π How to install and use Firejail on Linux π
π Read
via "Security on TechRepublic".
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use Firejail on Linux
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.
π How to install and use Firejail on Linux π
π Read
via "Security on TechRepublic".
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use Firejail on Linux
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.
π How to enable 2FA for Docker Hub π
π Read
via "Security on TechRepublic".
If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.π Read
via "Security on TechRepublic".
π How to enable 2FA for Docker Hub π
π Read
via "Security on TechRepublic".
If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.π Read
via "Security on TechRepublic".
TechRepublic
How to enable 2FA for Docker Hub
If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.
β Happy Holidays β and big thanks to everyone whoβs working today! β
π Read
via "Naked Security".
Yes. there's a message in the Christmas tree.π Read
via "Naked Security".
Naked Security
Happy Holidays β and big thanks to everyone whoβs working today!
Yes. thereβs a message in the Christmas tree.
ATENTIONβΌ New - CVE-2018-18288
π Read
via "National Vulnerability Database".
CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection.π Read
via "National Vulnerability Database".
π΄ The Year of Magecart: How the E-Commerce Raiders Reigned in 2019 π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
The Year of Magecart: How the E-Commerce Raiders Reigned in 2019
Breaching British Airways, Ticketmaster, and Macy's, Magecart attack groups sharply rose in sophistication and pervasiveness this year -- and show no signs of slowing down.
π΄ Ransomware Situation Goes From Bad to Worse π΄
π Read
via "Dark Reading: ".
New malware distribution techniques and functionality updates are sure to put more pressure on enterprise organizations in 2020.π Read
via "Dark Reading: ".
Darkreading
Ransomware Situation Goes From Bad to Worse
New malware distribution techniques and functionality updates are sure to put more pressure on enterprise organizations in 2020.
β Top 10 Breaches and Leaky Server Screw Ups of 2019 β
π Read
via "Threatpost".
2019 was a banner year for data exposures, with billions of people affected by cloud misconfigurations, hacks and poor security practices in general. Here's the Threatpost Top 10 for data-breach news of the year, featuring all the low-lights.π Read
via "Threatpost".
Threat Post
Top 10 Breaches and Leaky Server Screw Ups of 2019
2019 was a banner year for data exposures, with billions of people affected.
β Combining AI and Playbooks to Predict Cyberattacks β
π Read
via "Threatpost".
Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.π Read
via "Threatpost".
Threat Post
Combining AI and Playbooks to Predict Cyberattacks
Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.
β Apple iCloud βdata dumpβ extortionist avoids prison β
π Read
via "Naked Security".
He claimed to have logins for millions of iCloud accounts, and told Apple he'd shut them all down unless he received a payoff.π Read
via "Naked Security".
Naked Security
Apple iCloud βdata dumpβ extortionist avoids prison
He claimed to have logins for millions of iCloud accounts, and told Apple heβd shut them all down unless he received a payoff.
π΄ 'Honoring' CCPA's Binding Principles Nationally Won't Be Easy π΄
π Read
via "Dark Reading: ".
Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.π Read
via "Dark Reading: ".
Darkreading
'Honoring' CCPA's Binding Principles Nationally Won't Be Easy
Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.
β Critical Citrix Bug Puts 80,000 Corporate LANs at Risk β
π Read
via "Threatpost".
The flaw resides in the Citrix Application Delivery Controller and Gateway.π Read
via "Threatpost".
Threat Post
Critical Citrix Bug Puts 80,000 Corporate LANs at Risk
The flaw resides in the Citrix Application Delivery Controller and Gateway.
ATENTIONβΌ New - CVE-2018-20492
π Read
via "National Vulnerability Database".
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It has Incorrect Access Control (issue 2 of 6).π Read
via "National Vulnerability Database".