WEEKLY CYBERSECURITY NEWSLETTER NO: 180
#WeeklyCybersecurityTip: Use a strong mix of characters for your passwords!
Download newsletter here. To receive these direct to your inbox, sign up here.
1- Defending Against OWASP Top 10 Vulnerabilities
Websites are everywhere. There are an estimated 12-24 million eCommerce sites across the planet. So it is only logical that you take your business online. But with the rising popularity of web markets, governments are paying more attention to them, enacting various rules and regulations to better pr…
2- STARTTLS Flaws in Email Clients Let Hackers Steak The Credentials From Apple Mail, Gmail, Mozilla Thunderbird
Nearly 40 different vulnerabilities were exposed lately by security researchers that are correlated with an opportunistic encryption mechanism in mail clients and servers.
These servers could open the gateway to targeted man-in-the-middle (MitM) attacks, enabling an attackers to trick the mailbox co…
3- New HolesWarm Botnet Exploiting 20 Known Vulnerabilities To Attack Windows & Linux Servers
The cybersecurity researchers at Tencent Cloud Firewall have recently detected a new highly volatile botnet which is dubbed as HolesWarm.
They reported that this new botnet exploiting more than 20 known vulnerabilities to hack Windows and Linux servers so that the operator of this botnet can instal…
4- How Ready Are You for a Ransomware Attack?
Determining how hard a target you present for the current wave of human-driven ransomware involves multiple considerations. There are four steps to analyzing how prepared you are for a ransomware attack.
Such analysis roughly breaks down as follows: (1) How easy it is to break into your environment …