Sun.Feb 10, 2019

New Linux coin miner kills competing malware to maximize profits

Security Affairs

Security experts from Trend Micro have discovered a new strain of coin miner that targets the Linux platform and installs the XMR-Stak Cryptonight cryptocurrency miner.

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

WIRED Threat Level

The shutdown may have ended two weeks ago, but federal cybersecurity professionals will be coping with its impact for a long time to come. Security

Thousands of RDM refrigeration systems exposed online are at risk

Security Affairs

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks.

Risk 96

Court Denies Non-Party’s Request to Quash Subpoena in Telecommunications Dispute: eDiscovery Case Law

eDiscovery Daily

In Fair v. Commc’ns Unlimited Inc., 4:17 CV 2391 RWS (E.D. 16, 2019) , Missouri District Judge Rodney W.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Google open sourced the ClusterFuzz fuzzing platform

Security Affairs

Google has open sourced ClusterFuzz, its fuzzing infrastructure it has developed to find memory corruption vulnerabilities in Chrome. Google has open sourced its fuzzing infrastructure ClusterFuzz that the tech giant developed to find memory corruption bugs in the Chrome browser.

Blog 89

Security Affairs newsletter Round 200 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you!