π΄ I'm an SMB. What Should I Watch for When Choosing Security Vendors? π΄
π Read
via "Dark Reading: ".
SMBs need action, not just insight.π Read
via "Dark Reading: ".
Dark Reading
I'm an SMB. What Should I Watch for When Choosing Security Vendors?
SMBs need action, not just insight.
π Top 10 tech policy trends to watch in 2020 π
π Read
via "Security on TechRepublic".
Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 tech policy trends to watch in 2020
Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.
β 200K WordPress Sites Vulnerable to Plugin Flaw β
π Read
via "Threatpost".
Developers behind WordPress plugin Code Snippets have issued a patch for the high-severity flaw.π Read
via "Threatpost".
Threat Post
200K WordPress Sites Vulnerable to Plugin Flaw
Developers behind WordPress plugin Code Snippets have issued a patch for the high-severity flaw.
π΄ How To Keep Your Privacy and Data Secure While Working With a Remote Team π΄
π Read
via "Dark Reading: ".
Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.π Read
via "Dark Reading: ".
Dark Reading
How To Keep Your Privacy and Data Secure While Working With a Remote Team
Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.
π΄ Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners π΄
π Read
via "Dark Reading: ".
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.π Read
via "Dark Reading: ".
Darkreading
Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.
π΄ Android Malware for Mobile Ad Fraud Spiked Sharply in 2019 π΄
π Read
via "Dark Reading: ".
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.π Read
via "Dark Reading: ".
Dark Reading
Android Malware for Mobile Ad Fraud Spiked Sharply in 2019
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.
π΄ Two Vulnerabilities Found in Microsoft Azure Infrastructure π΄
π Read
via "Dark Reading: ".
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.π Read
via "Dark Reading: ".
Darkreading
Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.
π How organizations should handle data breaches π
π Read
via "Security on TechRepublic".
How an organization handles a breach can be just as critical as protecting against one, according to Security.org.π Read
via "Security on TechRepublic".
TechRepublic
How organizations should handle data breaches
How an organization handles a breach can be just as critical as protecting against one, according to Security.org.
β Facebook to pay $550m to settle face-tagging suit β
π Read
via "Naked Security".
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like it's finally done churning through the courts.π Read
via "Naked Security".
Naked Security
Facebook to pay $550m to settle face-tagging suit
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like itβs finally done churning through the courts.
β Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program β
π Read
via "Threatpost".
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.π Read
via "Threatpost".
Threat Post
Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.
β Financial tech firms disagree on ban of customer data screen-scraping β
π Read
via "Naked Security".
They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they can't afford to build APIs instead.π Read
via "Naked Security".
Naked Security
Financial tech firms disagree on ban of customer data screen-scraping
They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they canβt afford to build APIs instead.
β US Interior Dept extends drone grounding over foreign hacking fears β
π Read
via "Naked Security".
The DOI has doubled down on a previous order, keeping the agencyβs drones grounded for another 30 days for a more in-depth security review.π Read
via "Naked Security".
Naked Security
US Interior Dept extends drone grounding over foreign hacking fears
The DOI has doubled down on a previous order, keeping the agencyβs drones grounded for another 30 days for a more in-depth security review.
β UN hacked via unpatched SharePoint server β
π Read
via "Naked Security".
UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.π Read
via "Naked Security".
Naked Security
UN hacked via unpatched SharePoint server
UN staffers: the βentire domainβ was probably compromised by an attacker who was lurking on the UNβs networks.
β Sodinokibi Ransomware Group Sponsors Hacking Contest β
π Read
via "Threatpost".
Larger winnings for underground skills competitions are attracting sophisticated crime groups.π Read
via "Threatpost".
Threat Post
Sodinokibi Ransomware Group Sponsors Hacking Contest
Larger winnings for underground skills competitions are attracting sophisticated crime groups.
π΄ Embracing a Prevention Mindset to Protect Critical Infrastructure π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Embracing a Prevention Mindset to Protect Critical Infrastructure
A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.
π How to avoid the mistakes made in the UN data breach π
π Read
via "Security on TechRepublic".
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid the mistakes made in the UN data breach
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.
π Lulzbuster 1.1.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.1.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π TOR Virtual Network Tunneling Tool 0.4.2.6 π
π Go!
via "Security Tool Files β Packet Storm".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.2.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Faraday 3.10.2 π
π Go!
via "Security Tool Files β Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Faraday 3.10.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 β
π Read
via "Threatpost".
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.π Read
via "Threatpost".
Threat Post
Zero Day Initiative Bug Hunters Rake in $1.5M in 2019
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.