π΄ Any Advice for Assessing Third-Party Risk? π΄
π Read
via "Dark Reading: ".
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.π Read
via "Dark Reading: ".
Dark Reading
Any Advice for Assessing Third-Party Risk?
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
β Panda Threat Group Mines for Monero With Updated Payload, Targets β
π Read
via "Threatpost".
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.π Read
via "Threatpost".
Threat Post
Panda Threat Group Mines for Monero With Updated Payload, Targets
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.
π΄ MITRE Releases 2019 List of Top 25 Software Weaknesses π΄
π Read
via "Dark Reading: ".
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
π΄ Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done' π΄
π Read
via "Dark Reading: ".
Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say.π Read
via "Dark Reading: ".
Dark Reading
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
β Teenage gamer jailed over lethal swatting β
π Read
via "Naked Security".
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.π Read
via "Naked Security".
Naked Security
Teenage gamer jailed over lethal swatting
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.
β Common storage and router devices are still hopelessly broken β
π Read
via "Naked Security".
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device - the chances are that itβs no more secure than its predecessors.π Read
via "Naked Security".
Naked Security
Common storage and router devices are still hopelessly broken
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device β the chances are that itβs no more secure than its predecessors.
β Leaky database spills data on 20 million Ecuadorians and businesses β
π Read
via "Naked Security".
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.π Read
via "Naked Security".
Naked Security
Leaky database spills data on 20 million Ecuadorians and businesses
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.
β Is $100 million enough to save the web from ads? β
π Read
via "Naked Security".
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.π Read
via "Naked Security".
Naked Security
Is $100 million enough to save the web from ads?
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.
β WannaCry β the worm that just wonβt die β
π Read
via "Naked Security".
WannaCry never went away - it just became less obvious.π Read
via "Naked Security".
Naked Security
WannaCry β the worm that just wonβt die
WannaCry never went away β it just became less obvious.
β Malware Moves: The Rise of LookBack β And Return of Emotet β
π Read
via "Threatpost".
The malware landscape is constantly changing; including a rise in a new malware called LookBack, as well as anticipation over the return of the Emotet and Retefe malware families.π Read
via "Threatpost".
Threat Post
Malware Moves: The Rise of LookBack β And Return of Emotet
Researchers believe that nation-state actors are behind several spearphishing campaigns targeting U.S. utility companies with a newly-identified malware called LookBack, which has the capabilities to view system data and reboot machines. Meanwhile, otherβ¦
β Massive Gaming DDoS Exploits Widespread Technology β
π Read
via "Threatpost".
The attack -- the 4th-largest the company has ever encountered -- leveraged WS-Discovery, the same exploit used in the 2016 Dyn incident.π Read
via "Threatpost".
Threat Post
Massive Gaming DDoS Exploits Widespread Technology
The attack β the 4th-largest the company has ever encountered β leveraged WS-Discovery, which is found "everywhere."
π Exposed RDP servers see 150K brute-force attempts per week: Here's how to protect them π
π Read
via "Security on TechRepublic".
BlueKeep and DejaBlue renewed interest in brute-force scanning for vulnerable systems, which negatively impacts Windows Server performance. Cameyo offers solutions to protect your Virtual Desktop server.π Read
via "Security on TechRepublic".
TechRepublic
Exposed RDP servers see 150K brute-force attempts per week: Here's how to protect them
BlueKeep and DejaBlue renewed interest in brute-force scanning for vulnerable systems, which negatively impacts Windows Server performance. Cameyo has solutions to protect your Virtual Desktop server.
β New! RFP Template for Selecting EDR/EPP and APT Security β
π Read
via "Threatpost".
Cynetβs new RFP templates clearly lay out the requirements for securing potential APT vectors.π Read
via "Threatpost".
Threat Post
New! RFP Template for Selecting EDR/EPP and APT Security
Cynetβs new RFP templates clearly lay out the requirements for securing potential APT vectors.
π PwC: Boosting digital resilience is the new best defense against cyber attacks π
π Read
via "Security on TechRepublic".
Now that you've completed your digital transformation, you need to build a system to protect this new way of doing business.π Read
via "Security on TechRepublic".
TechRepublic
PwC: Boosting digital resilience is the best defense against cyber attacks
Now that you've completed your digital transformation, you need to build a system to protect this new way of doing business.
π΄ How Ransomware Criminals Turn Friends into Enemies π΄
π Read
via "Dark Reading: ".
Managed service providers are the latest pawns in ransomware's game of chess.π Read
via "Dark Reading: ".
Darkreading
How Ransomware Criminals Turn Friends into Enemies
Managed service providers are the latest pawns in ransomware's game of chess.
β Edward Snowden Sued by U.S. Over New Memoir β
π Read
via "Threatpost".
The U.S. is attempting to seize any assets related to Edward Snowden's new memoir, Permanent Record.π Read
via "Threatpost".
Threat Post
Edward Snowden Sued by U.S. Over New Memoir
The U.S. is attempting to seize any assets related to Edward Snowden's new memoir, Permanent Record.
π Small businesses underestimate financial damage of cyberattacks π
π Read
via "Security on TechRepublic".
The average breach causes an average of $149,000 in damages, yet most small-to-medium-sized businesses thought cyberattacks would cost them under $10,000, survey reports.π Read
via "Security on TechRepublic".
TechRepublic
Small businesses underestimate financial damage of cyberattacks
The average breach causes an average of $149,000 in damages, yet most small-to-medium-sized businesses thought cyberattacks would cost them under $10,000, survey reports.