β Equifax Breach: Four Members of Chinese Military Charged with Hacking β
π Read
via "Threatpost".
Feds have charged four members of the Chinese Peopleβs Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.π Read
via "Threatpost".
Threat Post
Equifax Breach: Four Members of Chinese Military Charged with Hacking
Feds have charged four members of the Chinese Peopleβs Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.
π Global shipping industry attacked by coronavirus-themed malware π
π Read
via "Security on TechRepublic".
Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult.π Read
via "Security on TechRepublic".
TechRepublic
Global shipping industry attacked by coronavirus-themed malware
Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult.
π΄ Unlocked S3 Bucket Lets 36,077 Jail Files Escape π΄
π Read
via "Dark Reading: ".
The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.π Read
via "Dark Reading: ".
Dark Reading
Unlocked S3 Bucket Lets 36,077 Jail Files Escape - Dark Reading
The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities.
π 13 tips to avoid Valentine's Day online romance scams π
π Read
via "Security on TechRepublic".
Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself.π Read
via "Security on TechRepublic".
TechRepublic
13 tips to avoid Valentine's Day online romance scams
Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself.
π How some presidential campaigns use DMARC to protect their domains from being spoofed π
π Read
via "Security on TechRepublic".
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.π Read
via "Security on TechRepublic".
TechRepublic
How some presidential campaigns use DMARC to protect their domains from being spoofed
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.
π΄ China's Military Behind 2017 Equifax Breach: DoJ π΄
π Read
via "Dark Reading: ".
Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.π Read
via "Dark Reading: ".
Darkreading
China's Military Behind 2017 Equifax Breach: DoJ
Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.
π California AG Issues Revised CCPA Draft Rules π
π Read
via "Subscriber Blog RSS Feed ".
On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
California AG Issues Revised CCPA Draft Rules
On Friday, with just under five months to go until CCPA is enforced, California's Attorney General released a modified version of draft regulations for implementing the law.
β Active PayPal Phishing Scam Targets SSNs, Passport Photos β
π Read
via "Threatpost".
Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.π Read
via "Threatpost".
Threat Post
Active PayPal Phishing Scam Targets SSNs, Passport Photos
Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.
β BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver β
π Read
via "Threatpost".
The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.π Read
via "Threatpost".
Threat Post
BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver
The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.
π΄ Israel's Entire Voter Registry Exposed in Massive Incident π΄
π Read
via "Dark Reading: ".
Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.π Read
via "Dark Reading: ".
Dark Reading
Israel's Entire Voter Registry Exposed in Massive Incident
Personal details of nearly 6.5 million Israelis were out in the open after the entire registry was uploaded to an notably insecure app.
π Kubernetes rollouts: 5 security best practices π
π Read
via "Security on TechRepublic".
If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.π Read
via "Security on TechRepublic".
TechRepublic
Kubernetes rollouts: 5 security best practices
If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.
π΄ Some Democrats Lead Trump in Campaign Domain-Security Efforts π΄
π Read
via "Dark Reading: ".
Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.π Read
via "Dark Reading: ".
Dark Reading
Some Democrats Lead Trump in Campaign Domain-Security Efforts
Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.
π΄ How North Korea's Senior Leaders Harness the Internet π΄
π Read
via "Dark Reading: ".
Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.π Read
via "Dark Reading: ".
Darkreading
How North Korea's Senior Leaders Harness the Internet
Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.
ATENTIONβΌ New - CVE-2011-1596
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
β Facebookβs Twitter and Instagram accounts hijacked β
π Read
via "Naked Security".
In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the companyβs Twitter accounts.π Read
via "Naked Security".
Naked Security
Facebookβs Twitter and Instagram accounts hijacked
In full glare of the world, Facebook admins have found themselves in an unseemly struggle to wrestle back control of the companyβs Twitter accounts.
π IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed π
π Read
via "Security on TechRepublic".
Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.π Read
via "Security on TechRepublic".
TechRepublic
IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed
Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.
β Officials raise alarm about Chinese hacking β
π Read
via "Naked Security".
Officials pointed to ongoing threats against US institutions, painting a dire picture of hacking efforts to support Chinese economic goals.π Read
via "Naked Security".
Naked Security
Officials raise alarm about Chinese hacking
Officials pointed to ongoing threats against US institutions, painting a dire picture of hacking efforts to support Chinese economic goals.
β Freedom Hosting owner pleads guilty to distributing child abuse images β
π Read
via "Naked Security".
Eric Eoin Marques has pleaded guilty to running what was once believed to be the largest child abuse hosting provider on the dark web.π Read
via "Naked Security".
Naked Security
Freedom Hosting owner pleads guilty to distributing child abuse images
Eric Eoin Marques has pleaded guilty to running what was once believed to be the largest child abuse hosting provider on the dark web.
β Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution β
π Read
via "Threatpost".
The uncontrolled search path vulnerability allows a local user to use DLLs to escalate privileges and affects Windows PCs.π Read
via "Threatpost".
Threat Post
Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution
The uncontrolled search path vulnerability allows a local user to use DLLs to escalate privileges and affects Windows PCs.
π PayPal tops the list of most impersonated brand in phishing attacks π
π Read
via "Security on TechRepublic".
Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure.π Read
via "Security on TechRepublic".
π Security and disaster recovery are priorities when choosing data center provider π
π Read
via "Security on TechRepublic".
Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.π Read
via "Security on TechRepublic".
TechRepublic
Security and disaster recovery are priorities when choosing data center providers
Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.