β Sonosβs tone-deaf legacy product policy angers customers β
π Read
via "Naked Security".
Stopping software updates for legacy kit is nothing new, but it's the way the company has done it that has Sonos customers' hackles up.π Read
via "Naked Security".
Naked Security
Sonosβs tone-deaf legacy product policy angers customers
Stopping software updates for legacy kit is nothing new, but itβs the way the company has done it that has Sonos customersβ hackles up.
β Apple allegedly made nice with FBI by dropping iCloud encryption plan β
π Read
via "Naked Security".
Sources told Reuters that Apple may have been convinced by arguments made during the legal fight over cracking the San Bernardino iPhone.π Read
via "Naked Security".
Naked Security
Apple allegedly made nice with FBI by dropping iCloud encryption plan
Sources told Reuters that Apple may have been convinced by arguments made during the legal fight over cracking the San Bernardino iPhone.
β UN report alleges that Saudi crown prince hacked Jeff Bezosβs phone β
π Read
via "Naked Security".
Digital forensic evidence points to the phone's massive, months-long data egress having likely been triggered by Pegasus mobile spyware.π Read
via "Naked Security".
Naked Security
UN report alleges that Saudi crown prince hacked Jeff Bezosβs phone
Digital forensic evidence points to the phoneβs massive, months-long data egress having likely been triggered by Pegasus mobile spyware.
β Google: Flaws in Appleβs Private-Browsing Technology Allow for Third-Party Tracking β
π Read
via "Threatpost".
New research outlines vulnerabilities in Safariβs Intelligent Tracking Protection that can reveal user browsing behavior to third parties.π Read
via "Threatpost".
Threat Post
Google: Flaws in Appleβs Private-Browsing Technology Allow for Third-Party Tracking
New research outlines vulnerabilities in Safariβs Intelligent Tracking Protection that can reveal user browsing behavior to third parties.
β Looking for silver linings in the CVE-2020-0601 crypto vulnerability β
π Read
via "Naked Security".
Is there some good news hidden in the story of the CVE-2020-0601 crypto vulnerability?π Read
via "Naked Security".
Naked Security
Looking for silver linings in the CVE-2020-0601 crypto vulnerability
Is there some good news hidden in the story of the CVE-2020-0601 crypto vulnerability?
π΄ Weathering the Privacy Storm from GDPR to CCPA & PDPA π΄
π Read
via "Dark Reading: ".
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.π Read
via "Dark Reading: ".
Dark Reading
Weathering the Privacy Storm from GDPR to CCPA & PDPA
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.
π΄ Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says π΄
π Read
via "Dark Reading: ".
Attackers 'weaponized' Active Directory to spread the ransomware.π Read
via "Dark Reading: ".
Darkreading
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.
β Cisco Warns of Critical Network Security Tool Flaw β
π Read
via "Threatpost".
The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.π Read
via "Threatpost".
Threat Post
Cisco Warns of Critical Network Security Tool Flaw
The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.
π Why many small and midsized businesses remain vulnerable to cyberattack π
π Read
via "Security on TechRepublic".
Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle.π Read
via "Security on TechRepublic".
TechRepublic
Why many small and midsized businesses remain vulnerable to cyberattack
Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle.
π Falco 0.19.0 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.19.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ATENTIONβΌ New - CVE-2010-3295
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2008-7314
π Read
via "National Vulnerability Database".
mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-6758
π Read
via "National Vulnerability Database".
Server-side request forgery (SSRF) vulnerability in feed-proxy.php in extjs 5.0.0.π Read
via "National Vulnerability Database".
π΄ Severe Vulnerabilities Discovered in GE Medical Devices π΄
π Read
via "Dark Reading: ".
CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.π Read
via "Dark Reading: ".
Dark Reading
Severe Vulnerabilities Discovered in GE Medical Devices
CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.
π΄ Deconstructing Web Cache Deception Attacks: They're Bad; Now What? π΄
π Read
via "Dark Reading: ".
Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution.π Read
via "Dark Reading: ".
Dark Reading
Deconstructing Web Cache Deception Attacks: They're Bad; Now What? - Dark Reading
Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution.
β Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia β
π Read
via "Threatpost".
The malware uses thousands of partner websites to spread malvertising code.π Read
via "Threatpost".
Threat Post
Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia
The malware uses thousands of partner websites to spread malvertising code.
β U.S. Gov Agency Targeted With Malware-Laced Emails β
π Read
via "Threatpost".
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.π Read
via "Threatpost".
Threat Post
U.S. Gov Agency Targeted With Malware-Laced Emails
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
π CISA Warns of Uptick in Emotet Malware π
π Read
via "Subscriber Blog RSS Feed ".
CISA is spreading new guidance to ensure admins can properly defend against Emotet malware attacks, which the agency claims are on the rise.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
CISA Warns of Uptick in Emotet Malware
CISA is spreading new guidance to ensure admins can properly defend against Emotet malware attacks, which the agency claims are on the rise.
β Critical, Unpatched βMDhexβ Bugs Threaten Hospital Devices β
π Read
via "Threatpost".
The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.π Read
via "Threatpost".
Threat Post
Critical, Unpatched βMDhexβ Bugs Threaten Hospital Devices
The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.
π΄ NSA Offers Guidance on Mitigating Cloud Flaws π΄
π Read
via "Dark Reading: ".
A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.π Read
via "Dark Reading: ".
Dark Reading
NSA Offers Guidance on Mitigating Cloud Flaws
A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.
π΄ DHS Warns of Increasing Emotet Risk π΄
π Read
via "Dark Reading: ".
Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading