threatpost.comResearchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2....

threatpost.comThe XCSSET suite of malware also hijacks browsers, has a ransomware module and more -- and uses a pair of zero-day exploits....

threatpost.comThe recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites....

threatpost.comThe consumer-electronics giant had suffered partial outages across its U.S. website and internal systems reportedly, thanks to the Maze gang....

Heise Sicherheits NewsUngewohnt detailliert beschreiben US-Behörden in einem Bericht die technischen Einzelheiten eines Linux-Rootkits des Militärgeheimdienstes GRU aka APT28....

threatpost.comThe photo-sharing app retained people’s photos and private direct messages on its servers even after users removed them....

Heise Sicherheits NewsNachdem heisec-Leser kurz hintereinander zwei Lücken in der Website des Bundesamts für Wirtschaft und Ausfuhrkontrolle fanden, will dieses rundum nachbessern....

Heise Sicherheits NewsDer Schädling setzt auf 0-day-Exploits, um Nutzerdaten zu klauen. Manipulierte Xcode-Projekte finden über Github Verbreitung, warnt eine Sicherheitsfirma....

securitymagazine.comOver the past few months, millions of workers have turned their homes into their new, remote office, including state government employees, which brought a host of risks through use of unsecured Wi-Fi and poor access controls. This shift toward home as well as the underlying panic brought on by COVID-19 altered hackers’ focus and targets aimed at the remote worker. Chief Information Security Officers (CISO) preparing their companies for this change require time, training for employees and the right technology, as well as increased cooperation between the security teams and IT/network operations groups....

securitymagazine.comRogers State University has named Louis Ross as Chief of Campus Police.  ...

securitymagazine.comA new, international coalition put together by the Adrienne Arsht-Rockefeller Foundation Resilience Center wants to name and rank heat waves....

securitymagazine.comEmploying video surveillance that the public can see is not a new concept, but utilizing it for PEVO applications may be the next big breakthrough in security....

securitymagazine.comNY Governor Andrew M. Cuomo announced a new social media campaign to raise awareness of human trafficking and help dispel common misconceptions about the crime and its victims....

securitymagazine.comMUFG Union Bank announced that Devon Bryan has joined as Chief Information Security Officer (CISO)....

securitymagazine.comIn her “Top Breaches of 2019”, a security journalist asked if last year would “…be the worst on record?” It looks like 2020 could surpass last year’s breaches, but it’s not entirely due to consequences of the global pandemic. For sure, unprecedented levels of remote working has emboldened hackers to exploit new vulnerabilities, but there’s one very insidious risk that shows up year after year: the silent and unwitting exposure of sensitive data that no one notices… until it’s too late....

securitymagazine.comThe internet has become a powerful force for global interconnectivity and democratization. What’s more, the internet has introduced new methods for collective mobilization, such as “e-rebellions” and virtual protests. The global pandemic has accelerated the use of cyberspace as a powerful venue for individuals, groups, and nations to share ideas, engage, mobilize, and challenge authoritarian states in an impactful way....

securitymagazine.comThe National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a new Cybersecurity Advisory about previously undisclosed Russian malware....

securitymagazine.comESET researchers explored Mekotio, a banking trojan targeting Spanish- and Portuguese-speaking countries: mainly Brazil, Chile, Mexico, Spain, Peru and Portugal. Mekotio boasts several typical backdoor activities, including taking screenshots, restarting affected machines, restricting access to legitimate banking websites, and, in some variants, even stealing bitcoins and exfiltrating credentials stored by the Google Chrome browser....

securitymagazine.comJustice in Mexico has released the second edition of Organized Crime and Violence in Mexico Report, compiling the most recent data and analysis of crime, violence, and rule of law in Mexico.In addition to homicide, the report has expanded the scope of past editions to provide insight regarding trends in crimes such as kidnapping, extortion, and robbery....

securitymagazine.com(ISC)² announced the list of honorees for its 2020 (ISC)² Global Achievement Awards, which recognize and celebrate the most outstanding annual and lifetime achievements in the field of cybersecurity....

Weiter