π΄ EKANS Ransomware Raises Industrial-Control Worries π΄
π Read
via "Dark Reading: ".
Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.π Read
via "Dark Reading: ".
Darkreading
EKANS Ransomware Raises Industrial-Control Worries
Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.
π΄ Bad Certificate Knocks Teams Off Line π΄
π Read
via "Dark Reading: ".
Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Operations recent news | Dark Reading
Explore the latest news and expert commentary on Cybersecurity Operations, brought to you by the editors of Dark Reading
π΄ Bad Certificate Knocks Teams Offline π΄
π Read
via "Dark Reading: ".
Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.π Read
via "Dark Reading: ".
Darkreading
Bad Certificate Knocks Teams Offline
Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.
β Googleβs Super Bowl ad will make you cry. Or wince. β
π Read
via "Naked Security".
Google's Super Bowl ad featured an elderly man's voice as he asked Google Assistant to help him remember details about his late wife.π Read
via "Naked Security".
Naked Security
Googleβs Super Bowl ad will make you cry. Or wince.
Googleβs Super Bowl ad featured an elderly manβs voice as he asked Google Assistant to help him remember details about his late wife.
β Twitter gave access to studentβs account to his college β
π Read
via "Naked Security".
Twitter admitted it broke the rules when it handed over control of the student's account to college administrators.π Read
via "Naked Security".
Naked Security
Twitter gave access to studentβs account to his college
Twitter admitted it broke the rules when it handed over control of the studentβs account to college administrators.
β NIST tests methods of recovering data from smashed smartphones β
π Read
via "Naked Security".
Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.π Read
via "Naked Security".
Naked Security
NIST tests methods of recovering data from smashed smartphones
Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.
π 4 key trends to hit the cybersecurity industry in 2020 π
π Read
via "Security on TechRepublic".
Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank.π Read
via "Security on TechRepublic".
TechRepublic
4 key trends to hit the cybersecurity industry in 2020
Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank.
β Twitter API Abused to Uncover User Identities β
π Read
via "Threatpost".
State-sponsored actors may have been behind the social media abuse, said Twitter.π Read
via "Threatpost".
Threat Post
Twitter API Abused to Uncover User Identities
State-sponsored actors may have been behind the social media abuse, said Twitter.
π΄ What WON'T Happen in Cybersecurity in 2020 π΄
π Read
via "Dark Reading: ".
Predictions are a dime a dozen. Here are six trends that you won't be hearing about anytime soon.π Read
via "Dark Reading: ".
Darkreading
What WON'T Happen in Cybersecurity in 2020
Predictions are a dime a dozen. Here are six trends that you won't be hearing about anytime soon.
ATENTIONβΌ New - CVE-2012-5686
π Read
via "National Vulnerability Database".
ZPanel 10.0.1 has insufficient entropy for its password reset process.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-5618
π Read
via "National Vulnerability Database".
Ushahidi before 2.6.1 has insufficient entropy for forgot-password tokens.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4937
π Read
via "National Vulnerability Database".
Joomla! 1.7.1 has core information disclosure due to inadequate error checking.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4912
π Read
via "National Vulnerability Database".
Joomla! com_mailto 1.5.x through 1.5.13 has an automated mail timeout bypass.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3629
π Read
via "National Vulnerability Database".
Joomla! core 1.7.1 allows information disclosure due to weak encryptionπ Read
via "National Vulnerability Database".
π΄ Kubernetes Shows Built-in Weakness π΄
π Read
via "Dark Reading: ".
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.π Read
via "Dark Reading: ".
Dark Reading
Kubernetes Shows Built-in Weakness
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
π΄ Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users π΄
π Read
via "Dark Reading: ".
The company believes state-sponsored actors may also be involved.π Read
via "Dark Reading: ".
Darkreading
Twitter Suspends Fake Accounts Abusing Feature that Matches Phone Numbers and Users
The company believes state-sponsored actors may also be involved.
π΄ 7 Ways SMBs Can Secure Their Websites π΄
π Read
via "Dark Reading: ".
Here's what small and midsize businesses should consider when they decide it's time to up their website security.π Read
via "Dark Reading: ".
Dark Reading
7 Ways SMBs Can Secure Their Websites
Here's what small and midsize businesses should consider when they decide it's time to up their website security.
β Medtronic Patches Implanted Device, CareLink Programmer Bugs β
π Read
via "Threatpost".
The medical device giant has issued fixes for bugs first disclosed in 2018 and 2019.π Read
via "Threatpost".
Threat Post
Medtronic Patches Implanted Device, CareLink Programmer Bugs
The medical device giant has issued fixes for bugs first disclosed in 2018 and 2019.
β Two Critical Android Bugs Get Patched in February Update β
π Read
via "Threatpost".
As part of its February bug fixes, Google is patching a critical severity remote code execution vulnerability and an information disclosure bug.π Read
via "Threatpost".
Threat Post
Two Critical Android Bugs Get Patched in February Update
As part of its February bug fixes, Google is patching a critical severity remote code execution vulnerability and an information disclosure bug.
π΄ Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom π΄
π Read
via "Dark Reading: ".
For cities, states and towns, paying up is short-sighted and only makes the problem worse.π Read
via "Dark Reading: ".
Darkreading
Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom
For cities, states and towns, paying up is short-sighted and only makes the problem worse.