Security
Headlines
HeadlinesLatestCVEs

Tag

#Vulnerabilities

How to Build an Incident-Response Plan, Before Security Disaster Strikes

Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack.

Threatpost
#Breach#Cloud Security#InfoSec Insider#Malware#Mobile Security#Vulnerabilities#Web Security
MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed

Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.

New APT ChamelGang Targets Russian Energy, Aviation Orgs

First appearing in March, the group has been leveraging ProxyShell against targets in 10 countries and employs a variety of malware to steal data from compromised networks.

Google Emergency Update Fixes Two Chrome Zero Days

This is the second pair of zero days that Google's fixed this month, all four of which have been actively exploited in the wild.

Tips & Tricks for Unmasking Ghoulish API Behavior

Jason Kent, hacker-in-residence at Cequence Security, discusses how to track user-agent connections to mobile and desktop APIs, to spot malicious activity.

Apple Pay with Visa Hacked to Make Payments via Locked iPhones

Researchers have demonstrated that someone could use a stolen, locked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

Thousands of University Wi-Fi Networks Expose Log-In Credentials

Certificate misconfigurations of the EAP protocol in Eduroam (and likely other networks globally) threaten Android and Windows users.

Keep Attackers Out of VPNs: Feds Offer Guidance

The NSA and CISA issued recommendations on choosing and hardening VPNs to prevent nation-state APTs from weaponizing flaws & CVEs to break into protected networks.

Working Exploit Is Out for VMware vCenter CVE-2021-22005 Flaw

UPDATE: Indicators of compromise are now available. The unredacted RCE exploit released on Monday allows unauthenticated, remote attackers to upload files to the vCenter Server analytics service.

5 Steps to Securing Your Network Perimeter

Ekaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress.