π What's your organization's cybersecurity strategy? π
π Read
via "Security on TechRepublic".
Take this quick, multiple choice survey and tell us about your company's cybersecurity strategies for the upcoming year.π Read
via "Security on TechRepublic".
TechRepublic
Is your organization safe from a cybersecurity attack?
How is your company preventing the terror of a potential cybersecurity breach? Take this quick, multiple choice survey and tell us about it.
π΄ Greater Focus on Privacy Pays Off for Firms π΄
π Read
via "Dark Reading: ".
Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.π Read
via "Dark Reading: ".
Darkreading
Greater Focus on Privacy Pays Off for Firms
Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.
ATENTIONβΌ New - CVE-2011-4558
π Read
via "National Vulnerability Database".
Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2006-7246
π Read
via "National Vulnerability Database".
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.π Read
via "National Vulnerability Database".
β N.Y. Could Ban Cities from Paying Ransomware Attackers β
π Read
via "Threatpost".
State senators have issued proposals they say would encourage municipalities to upgrade their cyber-postures.π Read
via "Threatpost".
Threat Post
N.Y. Could Ban Cities from Paying Ransomware Attackers
State senators have issued proposals they say would encourage municipalities to upgrade their cyber-postures.
π Insider Leaked 1.2K Patient Records for 20 Months π
π Read
via "Subscriber Blog RSS Feed ".
The employee accessed information, including names, addresses, and social security numbers, from Feb. 2017 to Oct. 2019.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Insider Leaked 1.2K Patient Records for 20 Months
The employee accessed information, including names, addresses, and social security numbers, from Feb. 2017 to Oct. 2019.
β As Necurs Botnet Falls from Grace, Emotet Rises β
π Read
via "Threatpost".
Researchers wonder if a recent "amateur spam" campaign by the once-prevalant malware distribution botnet is a sign of trojans looking to other infection paths.π Read
via "Threatpost".
Threat Post
As Necurs Botnet Falls from Grace, Emotet Rises
Researchers wonder if a recent "amateur spam" campaign by the once-prevalant malware distribution botnet is a sign of trojans looking to other infection paths.
β Google, Mozilla Ban Hundreds of Browser Extensions in Chrome, Firefox β
π Read
via "Threatpost".
After discovering a wide pattern of potentially malicious behavior in browser extensions, the two search giants are cracking down.π Read
via "Threatpost".
Threat Post
Google, Mozilla Ban Hundreds of Browser Extensions in Chrome, Firefox
After discovering a wide pattern of potentially malicious behavior in browser extensions, Google and Mozilla are cracking down.
π How to protect previous Firefox tabs from being hijacked π
π Read
via "Security on TechRepublic".
Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.π Read
via "Security on TechRepublic".
TechRepublic
How to protect previous Firefox tabs from being hijacked
Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.
π Risk managers: Here are the must-have skills for 2020 π
π Read
via "Security on TechRepublic".
The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020?π Read
via "Security on TechRepublic".
TechRepublic
Risk managers: Here are the must-have skills for 2020
The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020?
π Aircrack-ng Wireless Network Tools 1.6 π
π Go!
via "Security Tool Files β Packet Storm".
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Aircrack-ng Wireless Network Tools 1.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Average Ransomware Payments More Than Doubled in Q4 2019 π΄
π Read
via "Dark Reading: ".
Ransomware attackers collected an average of around $84,000 from victim organizations, up from $41,000 in Q3 of 2018, Coveware says.π Read
via "Dark Reading: ".
Dark Reading
Average Ransomware Payments More Than Doubled in Q4 2019
Ransomware attackers collected an average of around $84,000 from victim organizations, up from $41,000 in Q3 of 2018, Coveware says.
π Okta ranks the most popular and fastest-growing apps in the enterprise π
π Read
via "Security on TechRepublic".
Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.π Read
via "Security on TechRepublic".
TechRepublic
Okta ranks the most popular and fastest-growing apps in the enterprise
Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.
β Mozilla bans Firefox extensions for executing remote code β
π Read
via "Naked Security".
Mozillaβs policy is unambiguous - add-ons must be self-contained and not load remote code, which opens up the user to all sorts of risks.π Read
via "Naked Security".
Naked Security
Mozilla bans Firefox extensions for executing remote code
Mozillaβs policy is unambiguous β add-ons must be self-contained and not load remote code, which opens up the user to all sorts of risks.
β Cisco patches bugs in security admin center and Webex β
π Read
via "Naked Security".
Cisco has patched bugs in Webex and in Firepower Management Centre, the device that controls its security products.π Read
via "Naked Security".
Naked Security
Cisco patches bugs in security admin center and Webex
Cisco has patched bugs in Webex and in Firepower Management Centre, the device that controls its security products.
β Facial recognition firm sued for scraping 3 billion faceprints β
π Read
via "Naked Security".
A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.π Read
via "Naked Security".
Naked Security
Facial recognition firm sued for scraping 3 billion faceprints
A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.
β States sue over rules that allow release of 3D-printed gun blueprints β
π Read
via "Naked Security".
The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.π Read
via "Naked Security".
Naked Security
States sue over rules that allow release of 3D-printed gun blueprints
The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.
β Zoom Fixes Flaw Opening Meetings to Hackers β
π Read
via "Threatpost".
Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.π Read
via "Threatpost".
Threat Post
Zoom Fixes Flaw Opening Meetings to Hackers
Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.
β LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks β
π Read
via "Threatpost".
New research from IOActive has found that βblindlyβ trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.π Read
via "Threatpost".
Threat Post
LoRaWAN for IoT: Beware Encryption Misconfigurations and Security Pitfalls
Researchers warn users not to βblindlyβ trust the encryption implementations of their LoRaWAN networks.
π΄ New Zoom Bug Prompts Security Fix, Platform Changes π΄
π Read
via "Dark Reading: ".
A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.π Read
via "Dark Reading: ".
Dark Reading
New Zoom Bug Prompts Security Fix, Platform Changes
A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.