π Businesses failing to meet California Consumer Privacy Act compliance goals π
π Read
via "Security on TechRepublic".
Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.π Read
via "Security on TechRepublic".
TechRepublic
Businesses failing to meet California Consumer Privacy Act compliance goals
Set to go into effect on January 1, 2020, the CCPA will affect lots of companies doing business in California, but 86% have yet to meet compliance goals.
π΄ Crowdsourced vs. Traditional Pen Testing π΄
π Read
via "Dark Reading: ".
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.π Read
via "Dark Reading: ".
Darkreading
Crowdsourced vs. Traditional Pen Testing
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.
β Norsk Hydro Calls Ransomware Attack βSevereβ β
π Read
via "Threatpost".
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.π Read
via "Threatpost".
Threat Post
Norsk Hydro Calls Ransomware Attack βSevereβ
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.
β Microsoft wonβt patch Windows registry warning problem β
π Read
via "Naked Security".
A security researcher has found a way to tinker with Windowsβ core settings while persuading users to accept the changes.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Stealing Corporate Funds Still Top Goal of Messaging Attacks π΄
π Read
via "Dark Reading: ".
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.π Read
via "Dark Reading: ".
Darkreading
Stealing Corporate Funds Still Top Goal of Messaging Attacks
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.
β Researcher Says NSAβs Ghidra Tool Can Be Used for RCE β
π Read
via "Threatpost".
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.π Read
via "Threatpost".
Threat Post
Researcher Says NSAβs Ghidra Tool Can Be Used for RCE
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.
π΄ Norsk Hydro Shuts Plants Amid Ransomware Attack π΄
π Read
via "Dark Reading: ".
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.π Read
via "Dark Reading: ".
Darkreading
Norsk Hydro Shuts Plants Amid Ransomware Attack
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.
β New scam accuses you of child abuse, offers to remove evidence β
π Read
via "Naked Security".
This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.π Read
via "Naked Security".
Naked Security
New scam accuses you of child abuse, offers to remove evidence
This scam is both intimidating and disturbing β the crooks are presenting themselves as corrupt CIA officials who will take a bribe.
β Old Tech Spills Digital Dirt on Past Owners β
π Read
via "Threatpost".
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.π Read
via "Threatpost".
Threat Post
Old Tech Spills Digital Dirt on Past Owners
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.
π΄ The Case of the Missing Data π΄
π Read
via "Dark Reading: ".
The latest twist in the Equifax breach has serious implications for organizations.π Read
via "Dark Reading: ".
Darkreading
The Case of the Missing Data
The latest twist in the Equifax breach has serious implications for organizations.
π Help Needed to Solve AI Data Protection Challenges π
π Read
via "Subscriber Blog RSS Feed ".
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Help Needed to Solve AI Data Protection Challenges
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.
π΄ 6 Ways Mature DevOps Teams Are Killing It in Security π΄
π Read
via "Dark Reading: ".
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.π Read
via "Dark Reading: ".
Dark Reading
6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where elite DevOps organizations are better able to incorporate security into application security.
β Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack β
π Read
via "Threatpost".
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.π Read
via "Threatpost".
Threat Post
Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
π΄ DDoS Attack Size Drops 85% in Q4 2018 π΄
π Read
via "Dark Reading: ".
The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.π Read
via "Dark Reading: ".
Dark Reading
DDoS Attack Size Drops 85% in Q4 2018
The sharp decline follows an FBI takedown of so-called booter, or DDoS-for-hire, websites in December 2018.
β Host of Flaws Found in CUJO Smart Firewall β
π Read
via "Threatpost".
Some of the flaws would allow remote code-execution.π Read
via "Threatpost".
Threat Post
Host of Flaws Found in CUJO Smart Firewall
Some of the flaws would allow remote code-execution.
β Cardinal RAT Resurrected to Target FinTech Firms β
π Read
via "Threatpost".
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.π Read
via "Threatpost".
Threat Post
Cardinal RAT Resurrected to Target FinTech Firms
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.
π΄ Microsoft Office Dominates Most Exploited List π΄
π Read
via "Dark Reading: ".
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.π Read
via "Dark Reading: ".
Darkreading
Microsoft Office Dominates Most Exploited List
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.
β Elsevier exposes usersβ emails and passwords online β
π Read
via "Naked Security".
The science publisher is blaming a misconfigured server that exposed a constant stream of its usersβ credentials.π Read
via "Naked Security".
Naked Security
Elsevier exposes usersβ emails and passwords online
The science publisher is blaming a misconfigured server that exposed a constant stream of its usersβ credentials.
β Hacked tornado warning systems leave Texans in the dark β
π Read
via "Naked Security".
Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.π Read
via "Naked Security".
Naked Security
Hacked tornado warning systems leave Texans in the dark
Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.
β Firefox 66 now blocks autoplaying audio by default β
π Read
via "Naked Security".
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.π Read
via "Naked Security".
Naked Security
Firefox 66 now blocks autoplaying audio by default
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.
β Researchers fret over Netflix interactive TV traffic snooping β
π Read
via "Naked Security".
No sooner has Netflix made an interactive TV show than people are already pulling apart its privacy implications.π Read
via "Naked Security".
Naked Security
Researchers fret over Netflix interactive TV traffic snooping
No sooner has Netflix made an interactive TV show than people are already pulling apart its privacy implications.