β Teen entered βdark rabbit hole of suicidal contentβ online β
π Read
via "Naked Security".
Molly Russell's grieving father has backed a psychiatrists' report, saying that tech companies must be forced to hand over anonymized data.π Read
via "Naked Security".
Naked Security
Teen entered βdark rabbit hole of suicidal contentβ online
Molly Russellβs grieving father has backed a psychiatristsβ report, saying that tech companies must be forced to hand over anonymized data.
β FBI to inform election officials about hacking attempts β
π Read
via "Naked Security".
The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.π Read
via "Naked Security".
Naked Security
FBI to inform election officials about hacking attempts
The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.
β FBI seizes credentials-for-sale site WeLeakInfo.com β
π Read
via "Naked Security".
The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.π Read
via "Naked Security".
Naked Security
FBI seizes credentials-for-sale site WeLeakInfo.com
The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.
π΄ Are We Secure Yet? How to Build a "Post-Breach" Culture π΄
π Read
via "Dark Reading: ".
There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.π Read
via "Dark Reading: ".
Dark Reading
Are We Secure Yet? How to Build a Post-Breach Culture
There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.
π Maavi Fuzzing Utility π
π Go!
via "Security Tool Files β Packet Storm".
Maavi is a fuzzing tool that scans for vulnerabilities with obfuscated payloads. Has proxy support, records full history of actions, and has various bells and whistles.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Maavi Fuzzing Utility β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π New Bill Would Aid CCPA Compliance for HIPAA Business Associates π
π Read
via "Subscriber Blog RSS Feed ".
A new bill in California would amend the CCPA and further health data exemptions - namely data that's been de-identified in the eyes of HIPAA.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Would Aid CCPA Compliance for HIPAA Business Associates
A new bill in California would amend the CCPA and further health data exemptions - namely data that's been de-identified in the eyes of HIPAA.
π΄ Are We Secure Yet? How to Build a 'Post-Breach' Culture π΄
π Read
via "Dark Reading: ".
There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.π Read
via "Dark Reading: ".
Darkreading
Are We Secure Yet? How to Build a 'Post-Breach' Culture
There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top.
π How to access your 2FA Docker Hub account from the command line π
π Read
via "Security on TechRepublic".
With 2FA enabled on your Docker Hub account, you'll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work.π Read
via "Security on TechRepublic".
TechRepublic
How to access your 2FA Docker Hub account from the command line
With 2FA enabled on your Docker Hub account, you'll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work.
β What do online file sharers want with 70,000 Tinder images? β
π Read
via "Naked Security".
A researcher has discovered thousands of Tinder users' images publicly available for free online.π Read
via "Naked Security".
Naked Security
What do online file sharers want with 70,000 Tinder images?
A researcher has discovered thousands of Tinder usersβ images publicly available for free online.
ATENTIONβΌ New - CVE-2019-10581
π Read
via "National Vulnerability Database".
NULL is assigned to local instance of audio device pointer after free instead of global static pointer and can lead to use after free issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8998, Nicobar, QCS605, Rennell, SA6155P, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10579
π Read
via "National Vulnerability Database".
Buffer over-read can occur while playing the video clip which is not standard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10578
π Read
via "National Vulnerability Database".
Null pointer dereference can occur while parsing the clip which is nonstandard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10561
π Read
via "National Vulnerability Database".
Improper initialization of local variables which are parameters to sfs api may cause invalid pointer dereference and leads to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9206, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QM215, SDA660, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10558
π Read
via "National Vulnerability Database".
While transferring data from APPS to DSP, Out of bound in FastRPC HLOS Driver due to the data buffer which can be controlled by DSP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10548
π Read
via "National Vulnerability Database".
While trying to obtain datad ipc handle during DPL initialization, Heap use-after-free issue can occur if modem SSR occurs at same time in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SXR1130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10532
π Read
via "National Vulnerability Database".
Null-pointer dereference issue can occur while calculating string length when source string length is zero in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, Nicobar, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM8150, SM8250, SXR1130, SXR2130π Read
via "National Vulnerability Database".
β China and US top user data requests in Apple transparency report β
π Read
via "Naked Security".
Most of the US and China's requests had to do with investigations into fraud, suspected account access and phishing.π Read
via "Naked Security".
Naked Security
China and US top user data requests in Apple transparency report
Most of the US and Chinaβs requests had to do with investigations into fraud, suspected account access and phishing.
π΄ 7 Tips for Infosec Pros Considering A Lateral Career Move π΄
π Read
via "Dark Reading: ".
Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.π Read
via "Dark Reading: ".
Dark Reading
7 Tips for Infosec Pros Considering A Lateral Career Move
Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.
β Citrix ships patches as vulnerable servers come under attack β
π Read
via "Naked Security".
Citrix has issued its first set of patches fixing a nasty vulnerability that's been hanging over some of its biggest products.π Read
via "Naked Security".
Naked Security
Citrix ships patches as vulnerable servers come under attack
Citrix has issued its first set of patches fixing a nasty vulnerability thatβs been hanging over some of its biggest products.
β Hacker Leaks More Than 500K Telnet Credentials for IoT Devices β
π Read
via "Threatpost".
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.π Read
via "Threatpost".
Threat Post
Hacker Leaks More Than 500K Telnet Credentials for IoT Devices
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.