β US visa applicants required to hand over social media info β
π Read
via "Naked Security".
As of Friday, it's no longer optional - the US is been asking for five years of social media information.π Read
via "Naked Security".
Naked Security
US visa applicants required to hand over social media info
As of Friday, itβs no longer optional β the US is asking for five years of social media information.
β GandCrab ransomware service shuts up shop β
π Read
via "Naked Security".
The authors of the GandCrab ransomware strain are shutting their ransomware-as-a-service portal, allegedly walking away with a cool $150m.π Read
via "Naked Security".
Naked Security
GandCrab ransomware crooks to shut up shop
GandCrabβs creators are giving themselves a βwell-deserved retirementβ after extorting (they say) $2 billion.
β Synthetic clicks and the macOS flaw Apple canβt seem to fix β
π Read
via "Naked Security".
A researcher has found a way to abuse synthetic clicks in macOS "Catalina", and it hasnβt even shipped yet.π Read
via "Naked Security".
Naked Security
Synthetic clicks and the macOS flaw Apple canβt seem to fix
A researcher has found a way to abuse synthetic clicks in macOS βCatalinaβ, and it hasnβt even shipped yet.
π Employees are almost as dangerous to business security as hackers and cybercriminals π
π Read
via "Security on TechRepublic".
Non-malicious insiders are among the top three threat actors, according to an ISACA report.π Read
via "Security on TechRepublic".
TechRepublic
Employees are almost as dangerous to business security as hackers and cybercriminals
Non-malicious insiders are among the top three threat actors, according to an ISACA report.
π How to protect your customers' personal identifiable information π
π Read
via "Security on TechRepublic".
Personal identifiable information (PII) was the leading type of data breach in 2018, accounting for 97% of all breaches, according to a ForgeRock report.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your customers' personal identifiable information
Personal identifiable information (PII) was the leading type of data breach in 2018, accounting for 97% of all breaches, according to a ForgeRock report.
π΄ What Cyber Skills Shortage? π΄
π Read
via "Dark Reading: ".
Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Here's how.π Read
via "Dark Reading: ".
Dark Reading
What Cyber Skills Shortage?
Employers can solve the skills gap by first recognizing that there isn't an archetypal cybersecurity job in the same way that there isn't an archetypal automotive job. Here's how.
β A New Approach for Combating Insider Threats β
π Read
via "Threatpost".
Threat detection tools don't take into account the emotional aspect of insider threats, a panel of experts said at Infosecurity Europe this week.π Read
via "Threatpost".
Threat Post
A New Approach for Combating Insider Threats
Threat detection tools don't take into account the emotional aspect of insider threats, a panel of experts said at Infosecurity Europe this week.
π΄ Imperva Snaps Up Distil Networks for API, App Security π΄
π Read
via "Dark Reading: ".
Distil Networks' technology will be integrated into Imperva's security stack following the acquisition.π Read
via "Dark Reading: ".
Dark Reading
Imperva Snaps Up Distil Networks for API, App Security
Distil Networks' technology will be integrated into Imperva's security stack following the acquisition.
β AI Isnβt Good Enough When Lives Are on the Line, Experts Warn β
π Read
via "Threatpost".
During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation state cyber weapons.π Read
via "Threatpost".
Threat Post
AI Isnβt Good Enough When Lives Are on the Line, Experts Warn
During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation state cyber weapons.
π΄ Medical Debt Collector Breach Highlights Supply Chain Dangers π΄
π Read
via "Dark Reading: ".
The breach of the website of American Medical Collection Agency leaves the personal and financial information of nearly 12 million patients at risk.π Read
via "Dark Reading: ".
Darkreading
Medical Debt Collector Breach Highlights Supply Chain Dangers
The breach of the website of American Medical Collection Agency leaves the personal and financial information of nearly 12 million patients at risk.
π GandCrab Ransomware Gang Calling It Quits π
π Read
via "Subscriber Blog RSS Feed ".
The cybercriminals are reportedly winding down operations around the ransomware after claiming to have made $2 billion in ransom paymentsπ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
GandCrab Ransomware Gang Calling It Quits
The cybercriminals are reportedly winding down operations around the ransomware after claiming to have made $2 billion in ransom payments
π΄ Why FedRAMP Matters to Non-Federal Organizations π΄
π Read
via "Dark Reading: ".
Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.π Read
via "Dark Reading: ".
Darkreading
Why FedRAMP Matters to Non-Federal Organizations
Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.
π 6 questions to consider before implementing a disaster recovery plan π
π Read
via "Security on TechRepublic".
DRP's are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.π Read
via "Security on TechRepublic".
TechRepublic
6 questions to consider before implementing a disaster recovery plan
DRPs are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.
β Zebrocy: A Russian APT Specializing in Victim Profiling, Access β
π Read
via "Threatpost".
The Russian-speaking APT acts as a support group for high-profile APTs like Sofacy and BlackEnergy.π Read
via "Threatpost".
Threat Post
Zebrocy: A Russian APT Specializing in Victim Profiling, Access
The Russian-speaking APT acts as a support group for high-profile APTs like Sofacy and BlackEnergy.
π΄ How Today's Cybercriminals Sneak into Your Inbox π΄
π Read
via "Dark Reading: ".
The tactics and techniques most commonly used to slip past security defenses and catch employees off guard.π Read
via "Dark Reading: ".
Darkreading
How Today's Cybercriminals Sneak into Your Inbox
The tactics and techniques most commonly used to slip past security defenses and catch employees off guard.
β Zero-Day No More: Windows Bug Gets a Fix β
π Read
via "Threatpost".
0patch has released an interim micropatch for the dangerous LPE bug while we wait for Microsoft's official patch.π Read
via "Threatpost".
Threat Post
Zero-Day No More: Windows Bug Gets a Fix
0patch has released an interim micropatch for the dangerous LPE bug from SandboxEscaper, while we wait for Microsoft's official patch.
π΄ 7 Container Components That Increase a Network's Security π΄
π Read
via "Dark Reading: ".
A proof of concept at Interop19 showed just how simple a container deployment can be.π Read
via "Dark Reading: ".
Dark Reading
7 Container Components That Increase a Network's Security
A proof of concept at Interop19 showed just how simple a container deployment can be.
π΄ Robbinhood: Inside the Ransomware That Slammed Baltimore π΄
π Read
via "Dark Reading: ".
Attackers appear to have used a ransomware-as-a-service platform to wage the attack.π Read
via "Dark Reading: ".
Dark Reading
Robbinhood: Inside the Ransomware That Slammed Baltimore
Attackers appear to have used a ransomware-as-a-service platform to wage the attack.
π΄ 2.8 Billion US Consumer Records Lost in 2018 π΄
π Read
via "Dark Reading: ".
Healthcare breaches grew 400%, study shows.π Read
via "Dark Reading: ".
Darkreading
2.8 Billion US Consumer Records Lost in 2018
Healthcare breaches grew 400%, study shows.
β Is βSign in with Appleβ Marketing Spin or Privacy Magic? Experts Weigh In β
π Read
via "Threatpost".
The login scheme promises it won't share data -- and will be required for all developers using third-party sign-ins.π Read
via "Threatpost".
Threat Post
Is βSign in with Appleβ Marketing Spin or Privacy Magic? Experts Weigh In
The login scheme promises it won't share data β and will be required for all developers using third-party sign-ins.
π΄ Carbanak Attack: Two Hours to Total Compromise π΄
π Read
via "Dark Reading: ".
Investigation of the cybercrime group's attack on an East European bank shows how some attackers require very little time to broaden their access and establish persistence on a network.π Read
via "Dark Reading: ".
Darkreading
Carbanak Attack: Two Hours to Total Compromise
Investigation of the cybercrime group's attack on an East European bank shows how some attackers require very little time to broaden their access and establish persistence on a network.