β Apple Denies FBI Request to Unlock Shooterβs iPhoneβAgain β
π Read
via "Threatpost".
Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.π Read
via "Threatpost".
Threat Post
Apple Denies FBI Request to Unlock Shooterβs iPhoneβAgain
Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.
π΄ How to Keep Security on Life Support After Software End-of-Life π΄
π Read
via "Dark Reading: ".
It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?π Read
via "Dark Reading: ".
Dark Reading
How to Keep Security on Life Support After Software End-of-Life
It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?
π΄ Industrial Control System Features at Risk π΄
π Read
via "Dark Reading: ".
How some ICS product functions can be weaponized by altering their configurations.π Read
via "Dark Reading: ".
Dark Reading
Industrial Control System Features at Risk
How some ICS product functions can be weaponized by altering their configurations.
π΄ Processor Vulnerabilites Put Virtual Workloads at Risk π΄
π Read
via "Dark Reading: ".
Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based appsπ Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2011-5018 (koala_framework)
π Read
via "National Vulnerability Database".
Koala Framework before 2011-11-21 has XSS via the request_uri parameter.π Read
via "National Vulnerability Database".
π΄ Dustman Attack Underscores Iran's Cyber Capabilities π΄
π Read
via "Dark Reading: ".
For nearly six months, an attack group linked to Iran reportedly had access to the network of Bahrain's national oil company, Bapco, before it executed a destructive payload.π Read
via "Dark Reading: ".
Darkreading
Dustman Attack Underscores Iran's Cyber Capabilities
For nearly six months, an attack group linked to Iran reportedly had access to the network of Bahrain's national oil company, Bapco, before it executed a destructive payload.
β Adobe Patches Five Critical Illustrator CC Flaws β
π Read
via "Threatpost".
Overall Adobe patched nine flaws in Illustrator CC and Experience Manager.π Read
via "Threatpost".
Threat Post
Adobe Patches Five Critical Illustrator CC Flaws
Overall Adobe patched nine flaws in Illustrator CC and Experience Manager.
β Fleeceware is back in Google Play β massive fees for not much at all β
π Read
via "Naked Security".
The apps itself isn't malicious - the treachery lies in the payment model.π Read
via "Naked Security".
Naked Security
Fleeceware is back in Google Play β massive fees for not much at all
The apps itself isnβt malicious β the treachery lies in the payment model.
π΄ Consumer Reports Calls for IoT Manufacturers to Raise Security Standards π΄
π Read
via "Dark Reading: ".
A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.π Read
via "Dark Reading: ".
Darkreading
Consumer Reports Calls for IoT Manufacturers to Raise Security Standards
A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.
π Packet Fence 9.3.0 π
π Go!
via "Security Tool Files β Packet Storm".
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Packet Fence 9.3.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Windows 7 computers will no longer be patched after today β
π Read
via "Naked Security".
Today's the day. The balloon goes up. The ship goes down. The patches fall behind. The crooks pull ahead.π Read
via "Naked Security".
Naked Security
Windows 7 computers will no longer be patched after today
Todayβs the day. The balloon goes up. The ship goes down. The patches fall behind. The crooks pull ahead.
β Public Bug Bounty Takes Aim at Kubernetes Container Project β
π Read
via "Threatpost".
The cloud-focused program will pay out $10,000 as its top reward.π Read
via "Threatpost".
Threat Post
Public Bug Bounty Takes Aim at Kubernetes Container Project
The cloud-focused program will pay out $10,000 as its top reward.
β Google to Nix Chrome Support for Third-Party Cookies by 2022 β
π Read
via "Threatpost".
Google says it has a two-year timeline for phasing out support for third-party cookies in its Chrome web browser.π Read
via "Threatpost".
Threat Post
Google to Nix Chrome Support for Third-Party Cookies by 2022
Google says it has a two-year timeline for phasing out support for third-party cookies in its Chrome web browser.
π΄ Global Predictions for Energy Cyber Resilience in 2020 π΄
π Read
via "Dark Reading: ".
How prepared is the energy sector for an escalating attack surface in the operating technology environment? Here are five trends to watch.π Read
via "Dark Reading: ".
Darkreading
Global Predictions for Energy Cyber Resilience in 2020
How prepared is the energy sector for an escalating attack surface in the operating technology environment? Here are five trends to watch.
π΄ Attackers Increasingly Focus on Business Disruption π΄
π Read
via "Dark Reading: ".
Network intruders are staying undetected for an average of 95 days, enabling them to target critical systems and more completely disrupt business.π Read
via "Dark Reading: ".
Darkreading
Attackers Increasingly Focus on Business Disruption
Network intruders are staying undetected for an average of 95 days, enabling them to target critical systems and more completely disrupt business.
π How to protect your Windows 7 computers and data after Microsoft cuts off support π
π Read
via "Security on TechRepublic".
With no bug fixes or patches available for Windows 7 after Jan. 14, Veritas CIO John Abel offers tips to safeguard the PCs in your organization.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your Windows 7 computers and data after Microsoft cuts off support
With no bug fixes or patches available for Windows 7 after Jan. 14, Veritas CIO John Abel offers tips to safeguard the PCs in your organization.
π CISA Continues to Warn About Pulse Secure Attacks π
π Read
via "Subscriber Blog RSS Feed ".
CISA, the DHS agency that oversees cybersecurity matters in the US, is urging organizations to patch Pulse Secure VPN servers in the wake of news that they're being used to spread ransomware.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
CISA Continues to Warn About Pulse Secure Attacks
CISA, the DHS agency that oversees cybersecurity matters in the US, is urging organizations to patch Pulse Secure VPN servers in the wake of news that they're being used to spread ransomware.
π΄ Google: Chrome Will Remove Third-Party Cookies and Tracking π΄
π Read
via "Dark Reading: ".
It's "not about blocking" but removing them altogether, the company said.π Read
via "Dark Reading: ".
Dark Reading
Google: Chrome Will Remove Third-Party Cookies and Tracking
It's not about blocking but removing them altogether, the company said.
π΄ 'Fancy Bear' Targets Ukrainian Oil Firm Burisma in Phishing Attack π΄
π Read
via "Dark Reading: ".
The oil & gas company is at the heart of the ongoing US presidential impeachment case.π Read
via "Dark Reading: ".
Darkreading
'Fancy Bear' Targets Ukrainian Oil Firm Burisma in Phishing Attack
The oil & gas company is at the heart of the ongoing US presidential impeachment case.
β Microsoft Patches Major Crypto Spoofing Bug β
π Read
via "Threatpost".
January Patch Tuesday tackles 50 bugs, with eight rated critical, all as it pushes out its last regular Windows 7 patches.π Read
via "Threatpost".
Threat Post
Microsoft Patches Major Crypto Spoofing Bug
January Patch Tuesday tackles 50 bugs, with eight rated critical, all as it pushes out its last regular Windows 7 patches.
β Card Skimmer Hits Australian Bushfire Donation Site β
π Read
via "Threatpost".
Magecart groups using automated infection scans infected the site, which was running outdated Magento software.π Read
via "Threatpost".
Threat Post
Card Skimmer Hits Australian Bushfire Donation Site
Magecart groups using automated infection scans infected the site, which was running outdated Magento software.