β UN hacked via unpatched SharePoint server β
π Read
via "Naked Security".
UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.π Read
via "Naked Security".
Naked Security
UN hacked via unpatched SharePoint server
UN staffers: the βentire domainβ was probably compromised by an attacker who was lurking on the UNβs networks.
β Sodinokibi Ransomware Group Sponsors Hacking Contest β
π Read
via "Threatpost".
Larger winnings for underground skills competitions are attracting sophisticated crime groups.π Read
via "Threatpost".
Threat Post
Sodinokibi Ransomware Group Sponsors Hacking Contest
Larger winnings for underground skills competitions are attracting sophisticated crime groups.
π΄ Embracing a Prevention Mindset to Protect Critical Infrastructure π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Embracing a Prevention Mindset to Protect Critical Infrastructure
A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.
π How to avoid the mistakes made in the UN data breach π
π Read
via "Security on TechRepublic".
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid the mistakes made in the UN data breach
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.
π Lulzbuster 1.1.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.1.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π TOR Virtual Network Tunneling Tool 0.4.2.6 π
π Go!
via "Security Tool Files β Packet Storm".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.2.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Faraday 3.10.2 π
π Go!
via "Security Tool Files β Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Faraday 3.10.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 β
π Read
via "Threatpost".
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.π Read
via "Threatpost".
Threat Post
Zero Day Initiative Bug Hunters Rake in $1.5M in 2019
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.
π How to change iOS 13 settings for better security π
π Read
via "Security on TechRepublic".
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.π Read
via "Security on TechRepublic".
TechRepublic
How to change iOS 13 settings for better security
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.
β Serious Security β How βspecial caseβ code blew a hole in OpenSMTPD β
π Read
via "Naked Security".
Patch now before you receive a message that's more than just bad news!π Read
via "Naked Security".
Naked Security
Serious Security β How βspecial caseβ code blew a hole in OpenSMTPD
Patch now before you receive a message thatβs more than just bad news!
π΄ AppSec Concerns Drove 61% of Businesses to Change Applications π΄
π Read
via "Dark Reading: ".
According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.π Read
via "Dark Reading: ".
Dark Reading
AppSec Concerns Drove 61% of Businesses to Change Applications
According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.
π Friday Five: 1/31 Edition π
π Read
via "Subscriber Blog RSS Feed ".
The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 1/31 Edition
The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.
ATENTIONβΌ New - CVE-2011-4117
π Read
via "National Vulnerability Database".
The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4116
π Read
via "National Vulnerability Database".
_is_safe in the File::Temp module for Perl does not properly handle symlinks.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4115
π Read
via "National Vulnerability Database".
Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4088
π Read
via "National Vulnerability Database".
ABRT might allow attackers to obtain sensitive information from crash reports.π Read
via "National Vulnerability Database".
π΄ Ashley Madison Breach Returns with Extortion Campaign π΄
π Read
via "Dark Reading: ".
The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.π Read
via "Dark Reading: ".
Darkreading
Ashley Madison Breach Returns with Extortion Campaign
The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.
β Iranian Hackers Target U.S. Gov. Vendor With Malware β
π Read
via "Threatpost".
APT34 has been spotted in a malware campaign targeting customers and employees of a company that works closely with U.S. federal agencies, and state and local governments.π Read
via "Threatpost".
Threat Post
Iranian Hackers Target U.S. Gov. Vendor With Malware
APT34 has been spotted in a malware campaign targeting customers and employees of a company that works closely with U.S. federal agencies, and state and local governments.
π΄ 'George' the Most Popular Password That's a Name π΄
π Read
via "Dark Reading: ".
A new study of stolen passwords reflects the consequences of password overload.π Read
via "Dark Reading: ".
Darkreading
'George' the Most Popular Password That's a Name
A new study of stolen passwords reflects the consequences of password overload.
π΄ What It's Like to Be a CISO: Check Point Security Leader Weighs In π΄
π Read
via "Dark Reading: ".
Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.π Read
via "Dark Reading: ".
Darkreading
What It's Like to Be a CISO: Check Point Security Leader Weighs In
Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.
π Ashley Madison breach victims have more to worry about π
π Read
via "Security on TechRepublic".
Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.π Read
via "Security on TechRepublic".
TechRepublic
Ashley Madison breach victims have more to worry about
Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.