π Okta ranks the most popular and fastest-growing apps in the enterprise π
π Read
via "Security on TechRepublic".
Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.π Read
via "Security on TechRepublic".
TechRepublic
Okta ranks the most popular and fastest-growing apps in the enterprise
Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.
β Mozilla bans Firefox extensions for executing remote code β
π Read
via "Naked Security".
Mozillaβs policy is unambiguous - add-ons must be self-contained and not load remote code, which opens up the user to all sorts of risks.π Read
via "Naked Security".
Naked Security
Mozilla bans Firefox extensions for executing remote code
Mozillaβs policy is unambiguous β add-ons must be self-contained and not load remote code, which opens up the user to all sorts of risks.
β Cisco patches bugs in security admin center and Webex β
π Read
via "Naked Security".
Cisco has patched bugs in Webex and in Firepower Management Centre, the device that controls its security products.π Read
via "Naked Security".
Naked Security
Cisco patches bugs in security admin center and Webex
Cisco has patched bugs in Webex and in Firepower Management Centre, the device that controls its security products.
β Facial recognition firm sued for scraping 3 billion faceprints β
π Read
via "Naked Security".
A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.π Read
via "Naked Security".
Naked Security
Facial recognition firm sued for scraping 3 billion faceprints
A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.
β States sue over rules that allow release of 3D-printed gun blueprints β
π Read
via "Naked Security".
The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.π Read
via "Naked Security".
Naked Security
States sue over rules that allow release of 3D-printed gun blueprints
The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.
β Zoom Fixes Flaw Opening Meetings to Hackers β
π Read
via "Threatpost".
Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.π Read
via "Threatpost".
Threat Post
Zoom Fixes Flaw Opening Meetings to Hackers
Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.
β LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks β
π Read
via "Threatpost".
New research from IOActive has found that βblindlyβ trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.π Read
via "Threatpost".
Threat Post
LoRaWAN for IoT: Beware Encryption Misconfigurations and Security Pitfalls
Researchers warn users not to βblindlyβ trust the encryption implementations of their LoRaWAN networks.
π΄ New Zoom Bug Prompts Security Fix, Platform Changes π΄
π Read
via "Dark Reading: ".
A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.π Read
via "Dark Reading: ".
Dark Reading
New Zoom Bug Prompts Security Fix, Platform Changes
A newly discovered Zoom vulnerability would have enabled an attacker to join active meetings and access audio, video, and documents shared.
β MTTD and MTTR: Two Metrics to Improve Your Cybersecurity β
π Read
via "Threatpost".
While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor.π Read
via "Threatpost".
Threat Post
MTTD and MTTR: Two Metrics to Improve Your Cybersecurity
While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor.
π How to set up secure credential storage for Docker π
π Read
via "Security on TechRepublic".
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.π Read
via "Security on TechRepublic".
TechRepublic
How to set up secure credential storage for Docker
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.
β 5 ways to be a bit safer this Data Privacy Day β
π Read
via "Naked Security".
Here are 5 things you can start doing today for your own and for everyone else's online good!π Read
via "Naked Security".
Naked Security
5 ways to be a bit safer this Data Privacy Day
Here are 5 things you can start doing today for your own and for everyone elseβs online good!
π Security admins checklist: 10 tasks to perform every year π
π Read
via "Security on TechRepublic".
Here are 10 important tasks security administrators should perform to keep devices protected and secure.π Read
via "Security on TechRepublic".
TechRepublic
Security admins checklist: 10 tasks to perform every year
Here are 10 important tasks security administrators should perform to keep devices protected and secure.
ATENTIONβΌ New - CVE-2011-3614 (vanilla)
π Read
via "National Vulnerability Database".
An Access Control vulnerability exists in the Facebook, Twitter, and Embedded plugins in Vanilla Forums before 2.0.17.9.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3613 (vanilla)
π Read
via "National Vulnerability Database".
An issue exists in Vanilla Forums before 2.0.17.9 due to the way cookies are handled.π Read
via "National Vulnerability Database".
π C-suite unprepared for NotPetya and other extinction-level cyberattacks π
π Read
via "Security on TechRepublic".
Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.π Read
via "Security on TechRepublic".
TechRepublic
C-suite unprepared for NotPetya and other extinction-level cyberattacks
Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.
β Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners β
π Read
via "Threatpost".
The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.π Read
via "Threatpost".
Threat Post
Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners
The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.
π΄ CCPA: Cut From the Same Cloth as PCI DSS π΄
π Read
via "Dark Reading: ".
Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rulesπ Read
via "Dark Reading: ".
Darkreading
CCPA: Cut From the Same Cloth as PCI DSS
Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rules
π΄ Intel Previews Newest 'Zombieload' Patch π΄
π Read
via "Dark Reading: ".
Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.π Read
via "Dark Reading: ".
Dark Reading
Intel Previews Newest 'Zombieload' Patch
Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.
π Ex-Worker Stole 'Crown Jewels' Before Leaving Company π
π Read
via "Subscriber Blog RSS Feed ".
In a criminal trial, prosecutors for the now defunct fitness tracking company Jawbone are alleging the ex-employee stole studies the company considered its βcrown jewels" before joining Fitbit.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Ex-Worker Stole 'Crown Jewels' Before Leaving Company
In a criminal trial, prosecutors for the now defunct fitness tracking company Jawbone are alleging the ex-employee stole studies the company considered its βcrown jewels" before joining Fitbit.
π΄ Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft π΄
π Read
via "Dark Reading: ".
The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.π Read
via "Dark Reading: ".
Darkreading
Russian Brothers Sentenced to 12 Years for Fraud and Identity Theft
The pair, based in Fort Lauderdale, Fla., were running a sophisticated credit card fraud factory.
π΄ How Do I Get My Team Started with Container Security and Kubernetes? π΄
π Read
via "Dark Reading: ".
Begin with one application, then give your tech team some time to learn.π Read
via "Dark Reading: ".
Dark Reading
How Do I Get My Team Started with Container Security and Kubernetes?
Begin with one application, then give your tech team some time to learn.