β Letβs make ransomware MORE illegal, says Maryland β
π Read
via "Naked Security".
β¦ with a clumsily worded proposed bill that wouldn't protect researchers.π Read
via "Naked Security".
Naked Security
Letβs make ransomware MORE illegal, says Maryland
β¦ with a clumsily worded proposed bill that wouldnβt protect researchers.
π΄ Why Companies Should Care about Data Privacy Day π΄
π Read
via "Dark Reading: ".
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.π Read
via "Dark Reading: ".
Dark Reading
Why Companies Should Care about Data Privacy Day
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.
π΄ Why Threat Hunting Is Not for Everyone π΄
π Read
via "Dark Reading: ".
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.π Read
via "Dark Reading: ".
Darkreading
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.
π Cyberattacks against endpoints rising, reaching $9 million per attack in 2019 π
π Read
via "Security on TechRepublic".
Attacks against endpoints have become more costly, up more than $2 million since 2018.π Read
via "Security on TechRepublic".
TechRepublic
Cyberattacks against endpoints rising, reaching $9 million per attack in 2019
Attacks against endpoints have become more costly, up more than $2 million since 2018.
π΄ Why Threat Hunting Is Not for Everyone π΄
π Read
via "Dark Reading: ".
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.π Read
via "Dark Reading: ".
Darkreading
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.
β Anatomy of a βfreeβ gift β how online surveys can harm your digital health β
π Read
via "Naked Security".
Just how much will that Β£1000 "free" gift card cost? We took a look so you don't have to...π Read
via "Naked Security".
Naked Security
Anatomy of a βfreeβ gift β how online surveys can harm your digital health
Just how much will that Β£1000 βfreeβ gift card cost? We took a look so you donβt have toβ¦
β Intel promises fix after researchers reveal βCacheOutβ CPU flaws β
π Read
via "Naked Security".
Forget the infamous Meltdown and Spectre chip flaws from 2018, the problem thatβs tying down Intelβs patching team these days is a more recent class of side channel vulnerabilities known collectively as ZombieLoad.π Read
via "Naked Security".
Naked Security
Intel promises fix after researchers reveal βCacheOutβ CPU flaws
Forget the infamous Meltdown and Spectre chip flaws from 2018, the problem thatβs tying down Intelβs patching team these days is a more recent class of side channel vulnerabilities known collectiveβ¦
π΄ Businesses Improve Their Data Security, But Privacy - Not So Much π΄
π Read
via "Dark Reading: ".
While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.π Read
via "Dark Reading: ".
Darkreading
Businesses Improve Their Data Security, But Privacy β Not So Much
While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.
π΄ Securing Containers with Zero Trust π΄
π Read
via "Dark Reading: ".
A software identity-based approach should become a standard security measure for protecting workloads in all enterprise networks.π Read
via "Dark Reading: ".
Dark Reading
Securing Containers with Zero Trust
A software identity-based approach should become a standard security measure for protecting workloads in all enterprise networks.
β Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats β
π Read
via "Threatpost".
Maya Horowitz with Check Point Research discussed recently-disclosed Zoom vulnerabilities that could have opened up web conferencing meetings to hackers.π Read
via "Threatpost".
Threat Post
Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats
Maya Horowitz with Check Point Research discussed recently-disclosed Zoom vulnerabilities that could have opened up web conferencing meetings to hackers.
β Critical Flaws in Magento e-Commerce Platform Allow Code-Execution β
π Read
via "Threatpost".
Admins are encouraged to update their websites to stave off attacks from Magecart card-skimmers and others.π Read
via "Threatpost".
Threat Post
Critical Flaws in Magento e-Commerce Platform Allow Code-Execution
Admins are encouraged to update their websites to stave off attacks from Magecart card-skimmers and others.
π΄ Pilfered Wawa Payment Card Data Now for Sale on Dark Web π΄
π Read
via "Dark Reading: ".
The Joker's Stash underground marketplace is offering stolen payment card data from Wawa's recently disclosed data breach.π Read
via "Dark Reading: ".
Darkreading
Pilfered Wawa Payment Card Data Now for Sale on Dark Web
The Joker's Stash underground marketplace is offering stolen payment card data from Wawa's recently disclosed data breach.
ATENTIONβΌ New - CVE-2012-5776
π Read
via "National Vulnerability Database".
Dokeos 2.1.1 has multiple XSS issues involving "extra_" parameters in main/auth/profile.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4383
π Read
via "National Vulnerability Database".
contao prior to 2.11.4 has a sql injection vulnerabilityπ Read
via "National Vulnerability Database".
β Apple patches critical bugs on iPhone and Mac β update now! β
π Read
via "Naked Security".
Get them now before the crooks figure out what to do with the holes.π Read
via "Naked Security".
Naked Security
Apple patches critical bugs on iPhone and Mac β update now!
Get them now before the crooks figure out what to do with the holes.
π΄ 9 Things Application Security Champions Need to Succeed π΄
π Read
via "Dark Reading: ".
Common elements to highly effective security champion programs that take DevSecOps to the next levelπ Read
via "Dark Reading: ".
Dark Reading
9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level
π΄ Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise π΄
π Read
via "Dark Reading: ".
The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.π Read
via "Dark Reading: ".
Dark Reading
Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise
The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.
π Data Privacy: Top trends to watch in 2020 π
π Read
via "Security on TechRepublic".
Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.π Read
via "Security on TechRepublic".
TechRepublic
Data privacy: Top trends to watch in 2020
Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.
π΄ 9 Things Application Security Champions Need to Succeed π΄
π Read
via "Dark Reading: ".
Common elements to highly effective security champion programs that take DevSecOps to the next level.π Read
via "Dark Reading: ".
Dark Reading
9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
π Snack Bar Exec Mailed Trade Secrets To Himself π
π Read
via "Subscriber Blog RSS Feed ".
Hershey is suing a former exec who it claims took valuable trade secrets before leaving his job for a snack bar maker.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Snack Bar Exec Mailed Trade Secrets To Himself
Hershey is suing a former exec who it claims took valuable trade secrets before leaving his job for a snack bar maker.
β Google Sets Record High in Bug-Bounty Payouts β
π Read
via "Threatpost".
After a year of big changes, white hats reaped more from Google's programs than ever before.π Read
via "Threatpost".
Threat Post
Google Sets Record High in Bug-Bounty Payouts
After a year of big changes, white hats reaped more from Google's programs than ever before.