Posts

Great read.

Understanding how bad guys reuse infrastructure will show you the areas of your network to target when investigating new threats and reiteration of old malware.
darkreading.com

It's not a matter of "if" a breach will happen. It's a matter of "when" a breach will occur. Be prepared for the inevitable.

The research exposes the proliferation of bot-driven Web traffic and its impact on organizations’ application security
cisomag.com
Videos
Using TOR to protect your #privacy.
17
2
If you're using a public service, such as Dropbox or Box to store sensitive data, be sure to watch this video.
11
Need a reason to stop storing your username and passwords in your Internet browsers, such as Internet Explorer, Firefox, Chrome? Watch this video.
18
2
Photos
Posts

The talent shortage for IT Security/Cyber Security continues to be a huge challenge for employers. Talent demand is very strong, but the talent pool remains extremely limited.

Security analysts/investigators, application security specialists, and cloud security skills top a long list of skills deficits
csoonline.com

Use extra precaution when opening Microsoft Office documents, especially any office documents that you receive from someone you don't know.

Microsoft Office Remote Code Execution Vulnerability (CVE-2017-11882) Allows Hackers to Install Malware On Windows Computers Without User Interaction
thehackernews.com

A great example of how consumers are losing the battle of consumer privacy protection.

Behind many consumer websites, software companies track users' moves, potentially exposing personal information such as medical conditions or prescription-drug use.
wired.com

Facebook wants users to upload nude photos as an effort to combat "revenge porn". Yup, you read that right. In other breaking news, polaroid cameras and film is about to make a strong comeback.

Pilot program goals are laudable, but is the remedy as bad as the ailment it treats?
arstechnica.com

Ransomware Hits LG Self-Service Kiosks Across South Korea, Possibly WannaCry https://www.bleepingcomputer.com/…/ransomware-hits-lg-self…/

Representatives for LG South Korea said on Wednesday that a mysterious ransomware strain has infected self-servicing kiosks at various service...
bleepingcomputer.com

New Disdain Exploit Kit Detected in the Wild http://blog.trendmicro.com/…/new-disdain-exploit-kit-detec…/

The exploit kit landscape has been rocky since 2016, and we've observed several of the major players—Angler, Nuclear, Neutrino, Sundown—take a dip...
blog.trendmicro.com

PowerPoint Slide Show Files Used to Install Malware http://www.securityweek.com/powerpoint-slide-show-files-use…

Security researchers have discovered a flaw in the Windows Object Linking and Embedding interface that allows hackers access using Microsoft...
securityweek.com

Emotet�s goal: drop Dridex malware on as many endpoints as possible http://ow.ly/fEEq30elw6R

Emotet arrives as a malicious email attachment and tries to steal your online banking credentials
nakedsecurity.sophos.com

Cyberattack Leaves Millions Without Mobile Phone Service in Venezuela http://ow.ly/uMPz30elw6Q

A massive cyberattack that took down government websites in Venezuela earlier this week also has left seven million mobile phone users without...
securityweek.com

Patched Flash Player Sandbox Escape Leaked Windows Credentials http://ow.ly/s5dO30elw6O

One of Tuesday's Flash Player patches was a do-over after the researcher who privately reported the problem earlier this year discovered the...
threatpost.com

Juniper Issues Security Alert Tied to Routers and Switches http://ow.ly/RorW30elw6M

Juniper warned Thursday of a high-risk bug in the GD graphics library used in several versions of its Junos OS.
threatpost.com

Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders http://ow.ly/KftS30elw6J

Ukrainian Video-Blogger Sergey Neverov Arrested For Spreading Petya (NotPetya) Ransomware
thehackernews.com

More than 1,000 Spyware Apps Found On Android App Stores http://ow.ly/f07J30elw6H

Over 1000 SonicSpy Spyware Apps Found On Google Play Store And Android App Stores
thehackernews.com

Recently Patched Flash Bug Can Leak Windows Credentials http://ow.ly/zNhV30elw6D

Earlier this week, Adobe patched a vulnerability in Flash Player that allows an attacker to use malicious Flash files to leak Windows credentials.
bleepingcomputer.com