Pulse VPN patched their vulnerability, but businesses are trailing behind

Credit to Author: Pieter Arntz| Date: Fri, 18 Oct 2019 16:36:36 +0000

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

Read more

Microsoft fixes drop in number for October, 2019 updates

Credit to Author: SophosLabs Offensive Security| Date: Wed, 09 Oct 2019 20:00:31 +0000

A relatively low number of vulnerabilities were addressed in this month’s Windows update rollups<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/kC7qjGbuUh8″ height=”1″ width=”1″ alt=””/>

Read more

Whats So Strategic About the Trend Micro and Snyk Partnership?

Credit to Author: Trend Micro| Date: Tue, 08 Oct 2019 12:10:46 +0000

What does a partnership between Trend Micro and Snyk mean for you, the customer? Can you really develop and deploy applications anywhere without security slowing you down? Greg Young, VP of Cybersecurity for Trend Micro, explains how the partnership benefits Trend Micro and gives our customers an extra edge in their security platform.

The post Whats So Strategic About the Trend Micro and Snyk Partnership? appeared first on .

Read more

New iOS exploit checkm8 allows permanent compromise of iPhones

Credit to Author: Thomas Reed| Date: Fri, 27 Sep 2019 16:48:42 +0000

A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.

Categories:

Tags:

(Read more…)

The post New iOS exploit checkm8 allows permanent compromise of iPhones appeared first on Malwarebytes Labs.

Read more

A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

Credit to Author: Eric Avena| Date: Wed, 07 Aug 2019 23:50:25 +0000

Through a cross-company, cross-continent collaboration, we discovered a vulnerability, secured customers, and developed fix, all while learning important lessons that we can share with the industry.

The post A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response appeared first on Microsoft Security.

Read more

Big password hole in iOS 13 beta spotted by testers

Credit to Author: John E Dunn| Date: Tue, 23 Jul 2019 10:18:52 +0000

A security clanger has been spotted in the current beta version of iOS 13 which allows anyone to access a user’s stored web and app passwords without having to authenticate.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/aZwDCfTPAro” height=”1″ width=”1″ alt=””/>

Read more

Your Android’s accelerometer could be used to eavesdrop on your calls

Credit to Author: Danny Bradbury| Date: Tue, 23 Jul 2019 10:13:08 +0000

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/XizfSFAizIQ” height=”1″ width=”1″ alt=””/>

Read more