π΄ The Increasingly Vulnerable Software Supply Chain π΄
π Read
via "Dark Reading: ".
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.π Read
via "Dark Reading: ".
Darkreading
The Increasingly Vulnerable Software Supply Chain
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.
π Microsoft Office is more dangerous than you think: Doc deliver 45% of all malware π
π Read
via "Security on TechRepublic".
Malicious Microsoft Office attachments are more common than malicious batch scripts and PowerShell scripts, according to Cofense Intelligence. Here's how to protect your business.π Read
via "Security on TechRepublic".
π΄ Bomgar Buys BeyondTrust π΄
π Read
via "Dark Reading: ".
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.π Read
via "Dark Reading: ".
Dark Reading
Bomgar Buys BeyondTrust
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.
π΄ Kelihos Botnet Operator Pleads Guilty in Federal Court π΄
π Read
via "Dark Reading: ".
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.π Read
via "Dark Reading: ".
Darkreading
Kelihos Botnet Operator Pleads Guilty in Federal Court
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.
π΄ Enterprise Security Needs an Open Data Solution π΄
π Read
via "Dark Reading: ".
What would it look like if more than a tiny fraction of enterprises had access to all the signals hidden in their big data today?π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery β
π Read
via "The first stop for security news | Threatpost ".
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.
β You didnβt buy βyourβ iTunes movies; Apple can delete them anytime β
π Read
via "Naked Security".
It's in the terms of service, as one man found out after Apple removed three movies from his iTunes library.π Read
via "Naked Security".
Naked Security
You didnβt buy βyourβ iTunes movies; Apple can delete them anytime
Itβs in the terms of service, as one man found out after Apple removed three movies from his iTunes library.
β Review that! Fake TripAdvisor review peddler sent to jail β
π Read
via "Naked Security".
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.π Read
via "Naked Security".
Naked Security
Review that! Fake TripAdvisor review peddler sent to jail
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.
π Google reinstates www to URLs in Chrome after user backlash, but only temporarily π
π Read
via "Security on TechRepublic".
Less than a week after Chrome was updated to hide the "www" from users, Google have put the subdomain back into the address bar, but only temporarily.π Read
via "Security on TechRepublic".
TechRepublic
Google reinstates www to URLs in Chrome after user backlash, but only temporarily
Less than a week after Chrome was updated to hide the "www" from users, Google have put the subdomain back into the address bar.
β Review that! Fake TripAdvisor review peddler sent to jail β
π Read
via "Naked Security".
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.π Read
via "Naked Security".
Naked Security
Review that! Fake TripAdvisor review peddler sent to jail
Jail time for fake reviews is βa landmark ruling for the Internet,β TripAdvisor said.
β Major US mobile carriers want to be your password β
π Read
via "Naked Security".
Project Verify from Verizon, AT&T, Sprint and T-Mobile aims to replace your password.π Read
via "Naked Security".
Naked Security
Major US mobile carriers want to be your password
Project Verify from Verizon, AT&T, Sprint and T-Mobile aims to replace your password.
β Blockchain hustler beats the house with smart contract hack β
π Read
via "Naked Security".
A hacker used their own code to tamper with a smart contract run by a betting company, and walked off with $24,000.π Read
via "Naked Security".
Naked Security
Blockchain hustler beats the house with smart contract hack
A hacker used their own code to tamper with a smart contract run by a betting company, and walked off with $24,000.
β Magecart Threat Group Racks Up More Hack Victims β
π Read
via "The first stop for security news | Threatpost ".
The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Magecart Threat Group Racks Up More Hack Victims
The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways.
π Why 31% of data breaches lead to employees getting fired π
π Read
via "Security on TechRepublic".
North America is the region where C-Suite leaders are most likely to be blamed for a breach.π Read
via "Security on TechRepublic".
TechRepublic
Why 31% of data breaches lead to employees getting fired
North America is the region where C-Suite leaders are most likely to be blamed for a breach.
π German manufacturers lose $50B to cyber attacks, SMBs at greatest risk π
π Read
via "Security on TechRepublic".
A quarter of German manufacturing companies reported losing sensitive mobile phone data, according to a Bitkom survey.π Read
via "Security on TechRepublic".
TechRepublic
German manufacturers lose $50B to cyber attacks, SMBs at greatest risk
A quarter of German manufacturing companies reported losing sensitive mobile phone data, according to a Bitkom survey.
π΄ Cybersecurity Is Only 1 Part of Election Security π΄
π Read
via "Dark Reading: ".
Protecting the 2018 election cycle means fixing the information infrastructure.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Is Only 1 Part of Election Security - Dark Reading
Protecting the 2018 election cycle means fixing the information infrastructure.
π΄ Guccifer to Be Extradited to US for Prison Sentence π΄
π Read
via "Dark Reading: ".
Four-year, four-month term will follow a longer sentence in hacker's home country of Romania.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Five Weakest Links in Cybersecurity That Target the Supply Chain β
π Read
via "The first stop for security news | Threatpost ".
Third-party breaches have become an epidemic as cybercriminals target the weakest link. Organizations such as BestBuy, Sears, Delta and even NYU Medical Center are just a few that have felt the impact of cyberattacks through third-party vendors. The fallout from these breaches can be costly, as the average enterprise pays $1.23 million per incident, up [β¦]π Read
via "The first stop for security news | Threatpost ".
Threat Post
Five Weakest Links in Cybersecurity That Target the Supply Chain
Third-party breaches have become an epidemic as cybercriminals target the weakest link. Organizations such as BestBuy, Sears, Delta and even NYU Medical Center are just a few that have felt the impactβ¦
π΄ Military, Government Users Just as Bad About Password Hygiene as Civilians π΄
π Read
via "Dark Reading: ".
New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.π Read
via "Dark Reading: ".
Dark Reading
Military, Government Users Just as Bad About Password Hygiene as Civilians
New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.
π΄ EternalBlue Infections Persist π΄
π Read
via "Dark Reading: ".
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.π Read
via "Dark Reading: ".
Dark Reading
EternalBlue Infections Persist
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.
β E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content β
π Read
via "The first stop for security news | Threatpost ".
The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if theyβre not based there.π Read
via "The first stop for security news | Threatpost ".
Threat Post
E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content
The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if theyβre not based there.