β Google pulls 500 malicious Chrome extensions after researcher tip-off β
π Read
via "Naked Security".
Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.π Read
via "Naked Security".
Naked Security
Google pulls 500 malicious Chrome extensions after researcher tip-off
Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.
ATENTIONβΌ New - CVE-2013-3738
π Read
via "National Vulnerability Database".
A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.π Read
via "National Vulnerability Database".
π How to report a phishing or spam email to Microsoft π
π Read
via "Security on TechRepublic".
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.π Read
via "Security on TechRepublic".
TechRepublic
How to report a phishing or spam email to Microsoft
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.
π OpenSSH 8.2p1 π
π Go!
via "Security Tool Files β Packet Storm".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
OpenSSH 8.2p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ATENTIONβΌ New - CVE-2013-3722
π Read
via "National Vulnerability Database".
A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2412
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4531. Reason: This candidate is a duplicate of CVE-2012-4531. Notes: All CVE users should reference CVE-2012-4531 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
β Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs β
π Read
via "Threatpost".
A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.π Read
via "Threatpost".
Threat Post
Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs
A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.
β Sensitive plastic surgery images exposed online β
π Read
via "Naked Security".
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.π Read
via "Naked Security".
Naked Security
Sensitive plastic surgery images exposed online
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.
β IOTA shuts down network temporarily to fight wallet hacker β
π Read
via "Naked Security".
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.π Read
via "Naked Security".
Naked Security
IOTA shuts down network temporarily to fight wallet hacker
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.
β AI filter launched to block Twitter cyberflashing β
π Read
via "Naked Security".
A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.π Read
via "Naked Security".
Naked Security
AI filter launched to block Twitter cyberflashing
A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.
β Council returns to using pen and paper after cyberattack β
π Read
via "Naked Security".
Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Councilβs IT systems will return.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Python, microservices, and more tech trends for 2020, according to O'Reilly π
π Read
via "Security on TechRepublic".
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.π Read
via "Security on TechRepublic".
TechRepublic
Python, microservices, and more tech trends for 2020, according to O'Reilly
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.
β Hacker Scheme Threatens AdSense Customers with Account Suspension β
π Read
via "Threatpost".
Scam threatens to flood sites using Googleβs banner-ad program with bot and junk traffic if owners donβt pay $5K in bitcoin.π Read
via "Threatpost".
Threat Post
Hacker Scheme Threatens AdSense Customers with Account Suspension
Scam threatens to flood sites using Googleβs banner-ad program with bot and junk traffic if owners donβt pay $5K in bitcoin.
π΄ 8 Things Users Do That Make Security Pros Miserable π΄
π Read
via "Dark Reading: ".
When a user interacts with an enterprise system the result can be productivity or disaster. Here are 8 opportunities for the disaster side to win out over the productive.π Read
via "Dark Reading: ".
Darkreading
8 Things Users Do That Make Security Pros Miserable
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
π΄ Staircase to the Cloud: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...π Read
via "Dark Reading: ".
Dark Reading
Staircase to the Cloud: Dark Reading Caption Contest Winners
A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...
π΄ The Roads to Riches π΄
π Read
via "Dark Reading: ".
You could be making millions in just two years!π Read
via "Dark Reading: ".
Dark Reading
The Road(s) to Riches
You could be making millions in just two years!
β Malware and HTTPS β a growing love affair β
π Read
via "Naked Security".
HTTPS web encryption - blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.π Read
via "Naked Security".
Naked Security
Malware and HTTPS β a growing love affair
HTTPS web encryption β blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.
π΄ The Road(s) to Riches π΄
π Read
via "Dark Reading: ".
You could be making millions in just two years!π Read
via "Dark Reading: ".
Dark Reading
The Road(s) to Riches
You could be making millions in just two years!
π΄ Firmware Weaknesses Can Turn Computer Subsystems into Trojans π΄
π Read
via "Dark Reading: ".
Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.π Read
via "Dark Reading: ".
Darkreading
Firmware Weaknesses Can Turn Computer Subsystems into Trojans
Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.
π Mac attacks on the rise π
π Read
via "Security on TechRepublic".
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.π Read
via "Security on TechRepublic".
TechRepublic
Mac attacks on the rise
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.