β Former Uber CSO Charged With Paying βHush Moneyβ in 2016 Breach Cover-Up β
π Read
via "Threatpost".
Joseph Sullivan allegedly paid off $100K to the hackers responsible for a 2016 data breach, which exposed PII of 57 million passengers and drivers.π Read
via "Threatpost".
Threat Post
Former Uber CSO Charged With Paying βHush Moneyβ in 2016 Breach Cover-Up
Joseph Sullivan allegedly paid off $100K to the hackers responsible for a 2016 data breach, which exposed PII of 57 million passengers and drivers.
π΄ Smart-Lock Hacks Point to Larger IoT Problems π΄
π Read
via "Dark Reading: ".
Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.π Read
via "Dark Reading: ".
Dark Reading
Smart-Lock Hacks Point to Larger IoT Problems
Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.
π΄ Cryptominer Found Embedded in AWS Community AMI π΄
π Read
via "Dark Reading: ".
Researchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.π Read
via "Dark Reading: ".
Dark Reading
Cryptominer Found Embedded in AWS Community AMI
Researchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.
β Using AI to fight hand-crafted Business Email Compromise β
π Read
via "Naked Security".
Using natural language models to identify Business Email Compromise (BEC)π Read
via "Naked Security".
Naked Security
Using AI to fight hand-crafted Business Email Compromise
Using natural language models to identify Business Email Compromise (BEC)
π΄ Post-Pandemic Digitalization: Building a Human-Centric Cybersecurity Strategy π΄
π Read
via "Dark Reading: ".
COVID-19 won't be the last major disruption of its kind. Instead, it is a glimpse into what may be to come as digitalization continues to affect all aspects of our lives.π Read
via "Dark Reading: ".
Dark Reading
Post-Pandemic Digitalization: Building a Human-Centric Cybersecurity Strategy
COVID-19 won't be the last major disruption of its kind. Instead, it is a glimpse into what may be to come as digitalization continues to affect all aspects of our lives.
π΄ 'Next-Gen' Supply Chain Attacks Surge 430% π΄
π Read
via "Dark Reading: ".
Attackers are increasingly seeding open source projects with compromised components.π Read
via "Dark Reading: ".
Dark Reading
'Next-Gen' Supply Chain Attacks Surge 430%
Attackers are increasingly seeding open source projects with compromised components.
π Friday Five: 8/21 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Saudi Arabia using stolen twitter data to target critics, a significant increase in vishing, and the Secret Service buying location data to bypass warrants- catch up on this weekβs news with the Friday Five. - catch up on all the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 8/21 Edition
Saudi Arabia using stolen twitter data to target critics, a significant increase in vishing, and the Secret Service buying location data to bypass warrants- catch up on this weekβs news with the Friday Five.
β News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More β
π Read
via "Threatpost".
Threatpost editors discuss a cryptomining malware targeting AWS systems, a recent development in a lawsuit against the IBM-owned Weather Channel app, and more.π Read
via "Threatpost".
Threat Post
News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More
Threatpost editors discuss a cryptomining malware targeting AWS systems, a recent development in a lawsuit against the IBM-owned Weather Channel app, and more.
β Researchers Sound Alarm Over Malicious AWS Community AMIs β
π Read
via "Threatpost".
Malicious Community Amazon Machine Images are a ripe target for hackers, say researchers.π Read
via "Threatpost".
Threat Post
Researchers Sound Alarm Over Malicious AWS Community AMIs
Malicious Community Amazon Machine Images are a ripe target for hackers, say researchers.
π IoT safety: Logging devices on trucks are not always secure π
π Read
via "Security on TechRepublic".
Devices attached to trucks are for safety, quality control, and efficiency. But many are being left open to hackers.π Read
via "Security on TechRepublic".
TechRepublic
IoT safety: Logging devices on trucks are not always secure
Devices attached to trucks are for safety, quality control, and efficiency. But many are being left open to hackers.
β University of Utah Pays $457K After Ransomware Attack β
π Read
via "Threatpost".
The university said that it paid $457,000 to retrieve a decryption key after a ransomware attack encrypted student and faculty data on its servers.π Read
via "Threatpost".
Threat Post
University of Utah Pays $457K After Ransomware Attack
The university said that it paid $457,000 to retrieve a decryption key after a ransomware attack encrypted student and faculty data on its servers.
β Outlook βmail issuesβ phishing β donβt fall for this scam! β
π Read
via "Naked Security".
We deconstruct an email phishing scam in detail so you don't have to!π Read
via "Naked Security".
Naked Security
Outlook βmail issuesβ phishing β donβt fall for this scam!
We deconstruct an email phishing scam in detail so you donβt have to!
π΄ 74 Days From the Presidential Election, Security Worries Mount π΄
π Read
via "Dark Reading: ".
With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.π Read
via "Dark Reading: ".
Dark Reading
74 Days From the Presidential Election, Security Worries Mount
With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.
π How to install Infection Monkey for breach and attack simulations on your network π
π Read
via "Security on TechRepublic".
Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.π Read
via "Security on TechRepublic".
TechRepublic
How to install Infection Monkey for breach and attack simulations on your network
Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.
π΄ University of Utah Pays in Cyber-Extortion Scheme π΄
π Read
via "Dark Reading: ".
Though a ransomware attempt was thwarted, the university paid to prevent the release of student PII.π Read
via "Dark Reading: ".
Dark Reading
University of Utah Pays in Cyber-Extortion Scheme
Though a ransomware attempt was thwarted, the university paid to prevent the release of student PII.
β Monday review β catch up on our latest articles and videos β
π Read
via "Naked Security".
Our recent articles and videos, all in one place.π Read
via "Naked Security".
Naked Security
Monday review β catch up on our latest articles and videos
Our recent articles and videos, all in one place.
π Microsoft says the pandemic has changed the future of cybersecurity in these five ways π
π Read
via "Security on TechRepublic".
A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses' cybersecurity investments going forward.π Read
via "Security on TechRepublic".
π Security threats have already moved on from COVID-19-themed attacks, report finds π
π Read
via "Security on TechRepublic".
The pandemic is old news for cybercriminals who are still targeting remote workers, but are doing so with botnets and familiar exploits.π Read
via "Security on TechRepublic".
TechRepublic
Security threats have already moved on from COVID-19-themed attacks, report finds
The pandemic is old news for cybercriminals who are still targeting remote workers, but are doing so with botnets and familiar exploits.
π΄ Dark Reading Launches New Section on Physical Security π΄
π Read
via "Dark Reading: ".
Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.π Read
via "Dark Reading: ".
Dark Reading
Dark Reading Launches New Section on Physical Security
Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.
β APIs Are the Next Frontier in Cybercrime β
π Read
via "Threatpost".
APIs make your systems easier to run -- and make it easier for hackers, too.π Read
via "Threatpost".
Threat Post
APIs Are the Next Frontier in Cybercrime
APIs make your systems easier to run β and make it easier for hackers, too.
π΄ Average Cost of a Data Breach in 2020: $3.86M π΄
π Read
via "Dark Reading: ".
When companies defend themselves against cyberattacks, time is money.π Read
via "Dark Reading: ".
Dark Reading
Average Cost of a Data Breach in 2020: $3.86M
When companies defend themselves against cyberattacks, time is money.