π΄ 7 Tips for Infosec Pros Considering A Lateral Career Move π΄
π Read
via "Dark Reading: ".
Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.π Read
via "Dark Reading: ".
Dark Reading
7 Tips for Infosec Pros Considering A Lateral Career Move
Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.
β Citrix ships patches as vulnerable servers come under attack β
π Read
via "Naked Security".
Citrix has issued its first set of patches fixing a nasty vulnerability that's been hanging over some of its biggest products.π Read
via "Naked Security".
Naked Security
Citrix ships patches as vulnerable servers come under attack
Citrix has issued its first set of patches fixing a nasty vulnerability thatβs been hanging over some of its biggest products.
β Hacker Leaks More Than 500K Telnet Credentials for IoT Devices β
π Read
via "Threatpost".
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.π Read
via "Threatpost".
Threat Post
Hacker Leaks More Than 500K Telnet Credentials for IoT Devices
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.
π΄ Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking π΄
π Read
via "Dark Reading: ".
A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it.π Read
via "Dark Reading: ".
Dark Reading
Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking
A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it.
π If you don't like your browser, why won't you change to a different one? π
π Read
via "Security on TechRepublic".
Commentary: Users tend to stick with their preferred browser even when it works poorly for them.π Read
via "Security on TechRepublic".
TechRepublic
If you don't like your browser, why won't you change to a different one?
Commentary: Users tend to stick with their preferred browser even when it works poorly for them.
π How to use a physical security key to sign into supported websites π
π Read
via "Security on TechRepublic".
A security key is a good option to use for two-factor authentication when logging into certain websites.π Read
via "Security on TechRepublic".
TechRepublic
How to use a physical security key to sign into supported websites
A security key is a good option to use for two-factor authentication when logging into certain websites.
π Windows 7 remains an albatross at many large organizations π
π Read
via "Security on TechRepublic".
Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.π Read
via "Security on TechRepublic".
TechRepublic
Windows 7 remains an albatross at many large organizations
Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.
π΄ Data Awareness Is Key to Data Security π΄
π Read
via "Dark Reading: ".
Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape.π Read
via "Dark Reading: ".
Darkreading
Data Awareness Is Key to Data Security
Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape.
β Microsoft Zero-Day Actively Exploited, Patch Forthcoming β
π Read
via "Threatpost".
CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.π Read
via "Threatpost".
Threat Post
Microsoft Zero-Day Actively Exploited, Patch Forthcoming
CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.
β FTCODE Ransomware Now Steals Chrome, Firefox Credentials β
π Read
via "Threatpost".
New versions of the ransomware now sniff out saved credentials for Internet Explorer, Mozilla Firefox, Mozilla Thunderbird, Google Chrome and Microsoft Outlook.π Read
via "Threatpost".
Threat Post
FTCODE Ransomware Now Steals Chrome, Firefox Credentials
New versions of the ransomware now sniff out saved credentials for Internet Explorer, Mozilla Firefox, Mozilla Thunderbird, Google Chrome and Microsoft Outlook.
π΄ The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem π΄
π Read
via "Dark Reading: ".
We all make assumptions. They rarely turn out well. A new/old date problem offers a lesson in why that's so.π Read
via "Dark Reading: ".
Dark Reading
The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem
We all make assumptions. They rarely turn out well. A new/old date problem offers a lesson in why that's so.
π iOS-based devices: Zero-touch management essentials π
π Read
via "Security on TechRepublic".
Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management.π Read
via "Security on TechRepublic".
TechRepublic
iOS-based devices: Zero-touch management essentials
Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management.
β Citrix Accelerates Patch Rollout For Critical RCE Flaw β
π Read
via "Threatpost".
Citrix has issued the first of several updates fixing a critical vulnerability in various versions of its Citrix Application Delivery Controller (ADC) and Citrix Gateway products.π Read
via "Threatpost".
Threat Post
Citrix Accelerates Patch Rollout For Critical RCE Flaw
Citrix has issued the first of several updates fixing a critical vulnerability in various versions of its the Citrix Application Delivery Controller (ADC) and Citrix Gateway products.
π΄ Nearly 75% of SD-WAN Owners Lack Confidence Post-Digital Transformation π΄
π Read
via "Dark Reading: ".
More businesses think SD-WAN will reduce WAN costs, but only 37% think SD-WANs will help defend against malware and other threats.π Read
via "Dark Reading: ".
Dark Reading
Nearly 75% of SD-WAN Owners Lack Confidence Post-Digital Transformation
More businesses think SD-WAN will reduce WAN costs, but only 37% think SD-WANs will help defend against malware and other threats.
π΄ Ransomware Upgrades with Credential-Stealing Tricks π΄
π Read
via "Dark Reading: ".
The latest version of the FTCode ransomware can steal credentials from five popular browsers and email clients.π Read
via "Dark Reading: ".
Darkreading
Ransomware Upgrades with Credential-Stealing Tricks
The latest version of the FTCode ransomware can steal credentials from five popular browsers and email clients.
ATENTIONβΌ New - CVE-2012-5190
π Read
via "National Vulnerability Database".
Prizm Content Connect 5.1 has an Arbitrary File Upload Vulnerabilityπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-5282
π Read
via "National Vulnerability Database".
mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4336 (tikiwiki_cms/groupware)
π Read
via "National Vulnerability Database".
Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4322
π Read
via "National Vulnerability Database".
websitebaker prior to and including 2.8.1 has an authentication error in backup module.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4095
π Read
via "National Vulnerability Database".
Jara 1.6 has an XSS vulnerabilityπ Read
via "National Vulnerability Database".