β Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs β
π Read
via "Threatpost".
RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.π Read
via "Threatpost".
Threat Post
Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs
RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.
π UFONet 1.4 π
π Go!
via "Security Tool Files β Packet Storm".
UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
UFONet 1.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π How Shadow IT could put your organization at risk π
π Read
via "Security on TechRepublic".
Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.π Read
via "Security on TechRepublic".
TechRepublic
How Shadow IT could put your organization at risk
Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.
β Robbin Hood β the ransomware that brings its own bug β
π Read
via "Naked Security".
When you need a vulnerability to exploit, but there isn't one... why not simply bring your own, along with your malware?π Read
via "Naked Security".
Naked Security
RobbinHood β the ransomware that brings its own bug
When you need a vulnerability to exploit, but there isnβt oneβ¦ why not simply bring your own, along with your malware?
β Google Chrome To Bar HTTP File Downloads β
π Read
via "Threatpost".
File downloads like images or executables may not be delivered over HTTPS - even if they are available from an HTTPS website.π Read
via "Threatpost".
Threat Post
Google Chrome To Bar HTTP File Downloads
Downloads of files like images may be banned if they use HTTP connections - even if they are available from an HTTPS website.
ATENTIONβΌ New - CVE-2010-4658
π Read
via "National Vulnerability Database".
statusnet through 2010 allows attackers to spoof syslog messages via newline injection attacks.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2008-3793
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3792. Reason: This candidate is a duplicate of CVE-2008-3792. Notes: All CVE users should reference CVE-2008-3792 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
π΄ From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide π΄
π Read
via "Dark Reading: ".
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.π Read
via "Dark Reading: ".
Darkreading
From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
π΄ Poll: A Matter of Trust π΄
π Read
via "Dark Reading: ".
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.π Read
via "Dark Reading: ".
Dark Reading
Poll: A Matter of Trust
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.
π Hackers imitating CDC, WHO with coronavirus phishing emails π
π Read
via "Security on TechRepublic".
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.π Read
via "Security on TechRepublic".
TechRepublic
Hackers imitating CDC, WHO with coronavirus phishing emails
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.
π΄ RobbinHood Kills Security Processes Before Dropping Ransomware π΄
π Read
via "Dark Reading: ".
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.π Read
via "Dark Reading: ".
Darkreading
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
π How to use 7zip to encrypt files π
π Read
via "Security on TechRepublic".
If you need strong command line encryption on Linux, look no further than 7zip.π Read
via "Security on TechRepublic".
TechRepublic
How to use 7zip to encrypt files | TechRepublic
If you need strong command line encryption on Linux, look no further than 7zip.
π΄ CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten' π΄
π Read
via "Dark Reading: ".
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.π Read
via "Dark Reading: ".
Dark Reading
CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten'
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.
β Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed β
π Read
via "Threatpost".
The flaw was recently patched in Android's February Security Bulletin.π Read
via "Threatpost".
Threat Post
Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed
The flaw was recently patched in Android's February Security Bulletin.
π΄ Google Takeout Serves Up Video Files to Strangers π΄
π Read
via "Dark Reading: ".
A limited number of user videos were shared with others in a five-day incident from November.π Read
via "Dark Reading: ".
Dark Reading
Google Takeout Serves Up Video Files to Strangers
A limited number of user videos were shared with others in a five-day incident from November.
β Wacom Tablet Data Exfiltration Raises Security Concerns β
π Read
via "Threatpost".
Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.π Read
via "Threatpost".
Threat Post
Wacom Tablet Data Exfiltration Raises Security Concerns
Wacom stated that its data collection is done only in aggregate β but that doesn't fix the issues, according to security experts.
ATENTIONβΌ New - CVE-2011-1086
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in admin/system.html in Openfiler 2.3 allows remote attackers to inject arbitrary web script or HTML via the device parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1085
π Read
via "National Vulnerability Database".
CSRF vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1084
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
π The most overhyped, and most significant, tech trends of 2020 π
π Read
via "Security on TechRepublic".
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.π Read
via "Security on TechRepublic".
TechRepublic
The most overhyped, and most significant, tech trends of 2020
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.
π How to protect your privacy on an iOS device π
π Read
via "Security on TechRepublic".
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your privacy on an iOS device
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.