Archive

Posts Tagged ‘Dark Reading:’

Simulating Lateral Attacks Through Email

January 17, 2019 Leave a comment

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

from Dark Reading: https://ubm.io/2DgMnay
via IFTTT

Malware Built to Hack Building Automation Systems

January 16, 2019 Leave a comment

Researchers dig into vulnerabilities in popular building automation systems, devices.

from Dark Reading: https://ubm.io/2HdZ1v3
via IFTTT

Oklahoma Data Leak Compromises Years of FBI Data

January 16, 2019 Leave a comment

The Oklahoma Securities Commission accidentally leaked 3 TB of information, including data on years of FBI investigations.

from Dark Reading: https://ubm.io/2SZ4qYf
via IFTTT

Fortnite Players at Risk Via Epic Games Vulnerability

January 16, 2019 Leave a comment

Bugs in Epic Games’ platform could let intruders take over players’ accounts, view personal data, and/or buy in-game currency.

from Dark Reading: https://ubm.io/2SYhaOV
via IFTTT

How the US Chooses Which Zero-Day Vulnerabilities to Stockpile

January 16, 2019 Leave a comment

When it comes to acceptable circumstances for government disclosure of zero-days, the new Vulnerabilities Equity Process might be the accountability practice security advocates have been waiting for.

from Dark Reading: https://ubm.io/2MdnNdu
via IFTTT

BEC Groups Ramp Up Payroll Diversion Attacks

January 16, 2019 Leave a comment

Criminals are increasingly trying to defraud businesses by diverting payrolls of CEOs, other senior executives, Agari says.

from Dark Reading: https://ubm.io/2FDLOJn
via IFTTT

Fortnite Players at Risk Via Epic Games Vulnerability

January 16, 2019 Leave a comment

Bugs in Epic Games’ platform could let intruders take over players’ accounts, view personal data, and/or buy in-game currency.

from Dark Reading: https://ubm.io/2RTw5N4
via IFTTT