Security Leftovers
-
Malicious QR Codes Used in Phishing Attack Targeting US Energy Company [Ed: This fake novelty of "barcode" and "smart" phones was always a bad idea, a gimmick promoted by cargo cultists]
A widespread phishing campaign utilizing malicious QR codes has hit organizations in various industries, including a major energy company in the US.
-
Cisco Patches High-Severity Vulnerabilities in Enterprise Applications [Ed: "Enterprise" means back doored?]
Cisco has patched high-severity vulnerabilities in enterprise applications that could lead to privilege escalation, SQL injection, and denial-of-service.
-
How to secure your database | Ubuntu
Cybersecurity threats are increasing in volume, complexity and impact. Yet, organisations struggle to counter these growing threats. Cyber attacks often intend to steal, damage, hijack or alter value-generating data. In this article around database security, we use the NIST framework to lay out the common controls that you can implement to secure your databases. Let’s start by discussing the potential impact of unsecured databases.
-
Flashpoint report shows Australia among ‘most targeted [sic] countries’ for ransomware attacks in July [Ed: Windows TCO]
Risk intelligence company Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month.