π΄ Online Employment Scams on the Rise, Says FBI π΄
π Read
via "Dark Reading: ".
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.π Read
via "Dark Reading: ".
Dark Reading
Online Employment Scams on the Rise, Says FBI
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.
π΄ 5 Resume Basics for a Budding Cybersecurity Career π΄
π Read
via "Dark Reading: ".
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.π Read
via "Dark Reading: ".
π How to set up secure credential storage for Docker π
π Read
via "Security on TechRepublic".
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.π Read
via "Security on TechRepublic".
TechRepublic
How to set up secure credential storage for Docker
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.
π How to add a host to Observium π
π Read
via "Security on TechRepublic".
Now that you have the Observium network monitoring platform installed, it's time to add a host.π Read
via "Security on TechRepublic".
TechRepublic
How to add a host to Observium
Now that you have the Observium network monitoring platform installed, it's time to add a host.
β Google finds privacy holes in Safariβs ITP anti-tracking system β
π Read
via "Naked Security".
Appleβs much-vaunted Intelligent Tracking Prevention (ITP) could leave users exposed to a raft of privacy issues, including - ironically - being tracked.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π TestSSL 3.0 π
π Go!
via "Security Tool Files β Packet Storm".
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TestSSL 3.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β New Bill Proposes NSA Surveillance Reforms β
π Read
via "Threatpost".
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.π Read
via "Threatpost".
Threat Post
New Bill Proposes NSA Surveillance Reforms
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
π Hackers targeting Arabic-speaking countries with malicious Microsoft Office documents π
π Read
via "Security on TechRepublic".
Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco.π Read
via "Security on TechRepublic".
π Friday Five: 1/24 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 1/24 Edition
Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news with the Friday Five.
β Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings β
π Read
via "Threatpost".
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.π Read
via "Threatpost".
Threat Post
Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
π΄ 'CardPlanet' Operator Pleads Guilty in Federal Court π΄
π Read
via "Dark Reading: ".
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.π Read
via "Dark Reading: ".
Darkreading
'CardPlanet' Operator Pleads Guilty in Federal Court
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
β ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates β
π Read
via "Threatpost".
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.π Read
via "Threatpost".
Threat Post
ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.
π΄ 7 Steps to IoT Security in 2020 π΄
π Read
via "Dark Reading: ".
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.π Read
via "Dark Reading: ".
Dark Reading
7 Steps to IoT Security in 2020
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.
π΄ New Social Engineering Event to Train Business Pros on Human Hacking π΄
π Read
via "Dark Reading: ".
The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.π Read
via "Dark Reading: ".
Dark Reading
New Social Engineering Event to Train Business Pros on Human Hacking
The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.
π Lulzbuster 1.0.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From a big Microsoft data breach to the seizing of a stolen-creds site by the FBI - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β New York wants to ban taxpayer-funded ransomware payments β
π Read
via "Naked Security".
One of the proposed bills would set up a $5m fund to help small towns upgrade their systems and bolster their security.π Read
via "Naked Security".
Naked Security
New York wants to ban taxpayer-funded ransomware payments
One of the proposed bills would set up a $5m fund to help small towns upgrade their systems and bolster their security.
β Instagram CEOβs homes were targetted by SWATters β
π Read
via "Naked Security".
Instagram CEO Adam Mosseri's houses were surrounded by SWAT teams after hoax phone calls claimed hostages were being held there.π Read
via "Naked Security".
Naked Security
Instagram CEOβs homes were targetted by SWATters
Instagram CEO Adam Mosseriβs houses were surrounded by SWAT teams after hoax phone calls claimed hostages were being held there.
β Tinder to get panic button, catfish-fighting facial recognition β
π Read
via "Naked Security".
It's both a genius move to protect from assault and fraud and a personal data grab.π Read
via "Naked Security".
Naked Security
Tinder to get panic button, catfish-fighting facial recognition
Itβs both a genius move to protect from assault and fraud and a personal data grab.