β WordPress Flaw Opens Millions of WooCommerce Shops to Takeover β
π Read
via "The first stop for security news | Threatpost ".
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.π Read
via "The first stop for security news | Threatpost ".
Threat Post
WordPress Flaw Opens Millions of WooCommerce Shops to Takeover
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.
π΄ Utah Hacker Pleads Guilty to DoS Attacks: DoJ π΄
π Read
via "Dark Reading: ".
Online gaming companies, including Sony Online Entertainment, and servers were main targets.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
🕳 November Event Spotlight: CISO / CPO GDPR Summits, GDPR Workshops, 43rd Annual IP Institute, GBI CIO Event, Data Protection World Forum, EDAA Summit, IAPP Europe Data Protection Congress, Privacy Insight Series Webinar 🕳
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
π΄ Why Password Management and Company Security Strategies Fall Short π΄
π Read
via "Dark Reading: ".
Researchers say companies need to rethink their password training and take a more holistic approach to security.π Read
via "Dark Reading: ".
Dark Reading
Why Password Management and Company Security Strategies Fall Short
Researchers say companies need to rethink their password training and take a more holistic approach to security.
π How to enable SSL and TLS 1.3 on NGINX π
π Read
via "Security on TechRepublic".
Jack Wallen walks you through the steps for enabling SSL and TLS 1.3 on your NGINX websites.π Read
via "Security on TechRepublic".
TechRepublic
How to enable SSL and TLS 1.3 on NGINX
Jack Wallen walks you through the steps for enabling SSL and TLS 1.3 on your NGINX websites.
β Program Looks to Tap Military Vets for Cyber-Jobs β
π Read
via "The first stop for security news | Threatpost ".
The training and job-matching effort is a public-private partnership to address a growing workforce gap.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Program Looks to Tap Military Vets for Cyber-Jobs
The training and job-matching effort is a public-private partnership to address a growing workforce gap.
β Program Looks to Tap Military Vets for Cyber-Jobs β
π Read
via "The first stop for security news | Threatpost ".
The training and job-matching effort is a public-private partnership to address a growing workforce gap.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Program Looks to Tap Military Vets for Cyber-Jobs
The training and job-matching effort is a public-private partnership to address a growing workforce gap.
π΄ IT-to-OT Solutions That Can Bolster Security in the IIoT π΄
π Read
via "Dark Reading: ".
Industrial companies can use the hard-won, long-fought lessons of IT to leapfrog to an advanced state of Industrial Internet of Things security.π Read
via "Dark Reading: ".
Darkreading
IT-to-OT Solutions That Can Bolster Security in the IIoT
Industrial companies can use the hard-won, long-fought lessons of IT to leapfrog to an advanced state of Industrial Internet of Things security.
π How to make good business decisions about the spectrum of cyberthreats π
π Read
via "Security on TechRepublic".
Ray Rothrock, CEO of cyber-defense firm RedSeal, explains how to weigh each threat and respond appropriately.π Read
via "Security on TechRepublic".
TechRepublic
How to make good business decisions about the spectrum of cyberthreats
Ray Rothrock, CEO of cyber-defense firm RedSeal, explains how to weigh each threat and respond appropriately.
π΄ Checkmarx Acquires Custodela π΄
π Read
via "Dark Reading: ".
The purchase adds DevSecOps capabilities to a software license compliance platform.π Read
via "Dark Reading: ".
Dark Reading
Checkmarx Acquires Custodela
The purchase adds DevSecOps capabilities to a software license compliance platform.
π΄ Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm π΄
π Read
via "Dark Reading: ".
"Island-hopping" attackers breached StatCounter so they could get to users of gate.io.π Read
via "Dark Reading: ".
Dark Reading
Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm
Island-hopping attackers breached StatCounter so they could get to users of gate.io.
π΄ Finding Gold in the Threat Intelligence Rush π΄
π Read
via "Dark Reading: ".
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.π Read
via "Dark Reading: ".
Dark Reading
Finding Gold in the Threat Intelligence Rush
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.
π΄ New Side-Channel Attacks Target Graphics Processing Units π΄
π Read
via "Dark Reading: ".
A trio of new attacks bypass CPUs to wring data from vulnerable GPUs.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Phone companies slammed for lousy robocall efforts β
π Read
via "Naked Security".
By this time next year, says Chairman Ajit Pai, the FCC wants to see an anti-robocall system on consumers' phones - or else.π Read
via "Naked Security".
Naked Security
Phone companies slammed for lousy robocall efforts
By this time next year, says Chairman Ajit Pai, the FCC wants to see an anti-robocall system on consumersβ phones β or else.
β Google warning: Fix your dodgy ads within 30 days or get banned β
π Read
via "Naked Security".
Having taken what it thought was a decisive swipe at the problem of βabusiveβ advertising a year ago, Google now says next monthβs Chrome 71 will unleash an even tougher crackdown.π Read
via "Naked Security".
Naked Security
Google warning: Fix your dodgy ads within 30 days or get banned
Having taken what it thought was a decisive swipe at the problem of βabusiveβ advertising a year ago, Google now says next monthβs Chrome 71 will unleash an even tougher crackdown.
β Closed doors are no match for a WiβFi peeping tom and a smartphone β
π Read
via "Naked Security".
Researchers have found that a smartphone and some smart number crunching can track people moving in their homes as they reflect radio waves.π Read
via "Naked Security".
Naked Security
Closed doors are no match for a WiβFi peeping tom and a smartphone
Researchers have found that a smartphone and some smart number crunching can track people moving in their homes as they reflect radio waves.
β Apple Modernizes Its Hardware Security with T2 β
π Read
via "The first stop for security news | Threatpost ".
Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?π Read
via "The first stop for security news | Threatpost ".
Threat Post
Apple Modernizes Its Hardware Security with T2
Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?
β Ranting researcher publishes VM-busting zero-day without warning β
π Read
via "Naked Security".
A security researcher has published a zero-day flaw in a commonly-used virtual machine management system without notifying the vendor, justifying it with a scathing critique of the infosecurity industry.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Podcast: Troy Hunt Talks Bad Passwords β and Whoβs to Blame for Them β
π Read
via "The first stop for security news | Threatpost ".
Troy Hunt sounds off on how both consumers and services have a joint role in creating and enforcing strong passwords.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Podcast: Troy Hunt Talks Bad Passwords β and Whoβs to Blame for Them
Troy Hunt sounds off on how both consumers and services have a joint role in creating and enforcing strong passwords.
π΄ The Executive Summit Returns to Black Hat Europe 2018 π΄
π Read
via "Dark Reading: ".
This day-long event for CISOs and execs will show you the way to next-level skills, strategies, and techniques that will bolster your relevance and wow the board.π Read
via "Dark Reading: ".
Dark Reading
The Executive Summit Returns to Black Hat Europe 2018 - Dark Reading
This day-long event for CISOs and execs will show you the way to next-level skills, strategies, and techniques that will bolster your relevance and wow the board.