π Top 5 things to know about cyber insurance π
π Read
via "Security on TechRepublic".
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about cyber insurance
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.
π The 10 most important cyberattacks of the decade π
π Read
via "Security on TechRepublic".
After a number of devastating breaches and hacks, the sheer size of data lost is no longer the only indicator of severity.π Read
via "Security on TechRepublic".
TechRepublic
The 10 most important cyberattacks of the decade
After a number of devastating breaches and hacks, the sheer size of data lost is no longer the only indicator of severity.
β Iran Targets Mideast Oil with ZeroCleare Wiper Malware β
π Read
via "Threatpost".
Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing.π Read
via "Threatpost".
Threat Post
Iran Targets Mideast Oil with ZeroCleare Wiper Malware
Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing.
β βHighly Competitiveβ Buer Loader Emerges in Underground Markets β
π Read
via "Threatpost".
A previously undocumented loader has been discovered in several recent malware campaigns and being sold on underground markets.π Read
via "Threatpost".
Threat Post
βHighly Competitiveβ Buer Loader Emerges in Underground Markets
A previously-undocumented loader has been discovered in several recent malware campaigns and being sold on underground markets.
π΄ Navigating Security in the Cloud π΄
π Read
via "Dark Reading: ".
Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π With CCPA Looming, Politicians Pitch Last Minute Data Privacy Bills π
π Read
via "Subscriber Blog RSS Feed ".
One privacy bill would override state laws already on the books - like the CCPA - another would only pre-empt laws that conflict with certain provisions.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
With CCPA Looming, Politicians Pitch Last Minute Data Privacy Bills
One privacy bill would override state laws already on the books - like the CCPA - another would only pre-empt laws that conflict with certain provisions.
π΄ The Edge Cartoon Contest: You Better Watch Out ... π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
The Edge
Feeling creative this holiday season? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
π΄ (Literally) Put a Ring on It: Protecting Biometric Fingerprints π΄
π Read
via "Dark Reading: ".
Kaspersky creates a prototype ring you can wear on your finger for authentication.π Read
via "Dark Reading: ".
Dark Reading
(Literally) Put a Ring on It: Protecting Biometric Fingerprints
Kaspersky creates a prototype ring you can wear on your finger for authentication.
π΄ Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism π΄
π Read
via "Dark Reading: ".
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.
π΄ Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs π΄
π Read
via "Dark Reading: ".
'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.π Read
via "Dark Reading: ".
Darkreading
Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs
'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.
β Nebraska Medicine Breached By Rogue Employee β
π Read
via "Threatpost".
Nebraska Medicine is warning that a rogue, former employee accessed patients' medical records, Social Security numbers and more.π Read
via "Threatpost".
Threat Post
Nebraska Medicine Breached By Rogue Employee
Nebraska Medicine is warning that a rogue, former employee accessed patients' medical records, Social Security numbers and more.
π΄ What's in a Botnet? Researchers Spy on Geost Operators π΄
π Read
via "Dark Reading: ".
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.π Read
via "Dark Reading: ".
Darkreading
What's in a Botnet? Researchers Spy on Geost Operators
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.
β ThreatList: 1 in 9 SMBs Believe Nation-State Actors Are Targeting Them β
π Read
via "Threatpost".
Larger SMBs are more likely to feel targeted by APTs.π Read
via "Threatpost".
Threat Post
ThreatList: 90% of SMBs Believe Nation-State Actors Are Targeting Them
Larger SMBs are more likely to feel targeted by APTs.
π΄ Password-Cracking Teams Up in CrackQ Release π΄
π Read
via "Dark Reading: ".
The open source platform aims to make password-cracking more manageable and efficient for red teams.π Read
via "Dark Reading: ".
Dark Reading
Password-Cracking Teams Up in CrackQ Release
The open source platform aims to make password-cracking more manageable and efficient for red teams.
π Wireshark Analyzer 3.0.7 π
π Go!
via "Security Tool Files β Packet Storm".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Wireshark Analyzer 3.0.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π How to protect computers that store biometric data from malware π
π Read
via "Security on TechRepublic".
More than a third of systems that handle biometric data were hit by at least one malware infection in the third quarter of 2019, according to a new Kaspersky report.π Read
via "Security on TechRepublic".
TechRepublic
How to protect computers that store biometric data from malware
More than a third of systems that handle biometric data were hit by at least one malware infection in the third quarter of 2019, according to a new Kaspersky report.
β βUltimateβ MiTM Attack Steals $1M from Israeli Startup β
π Read
via "Threatpost".
Researchers uncovers βultimate man-in-the-middle attackβ that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business.π Read
via "Threatpost".
Threat Post
βUltimateβ MiTM Attack Steals $1M from Israeli Startup
Researchers uncovers βultimate man-in-the-middle attackβ that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business.
β S2 Ep19: One of us just prevented a ransomware attack β Naked Security Podcast β
π Read
via "Naked Security".
Listen now!π Read
via "Naked Security".
Naked Security
S2 Ep19: One of us just prevented a ransomware attack β Naked Security Podcast
Listen now!
π΄ The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem π΄
π Read
via "Dark Reading: ".
The industry can only go so far in treating security as a challenge that can be resolved only by engineering.π Read
via "Dark Reading: ".
Dark Reading
The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem - Dark Reading
The industry can only go so far in treating security as a challenge that can be resolved only by engineering.
β Yodel parcel tracking app blabs about other peopleβs parcels β
π Read
via "Naked Security".
Yodel's mobile parcel delivery app was leaking people's delivery data to others using the app, a security researcher discovered.π Read
via "Naked Security".
Naked Security
Yodel parcel tracking app blabs about other peopleβs parcels
Yodelβs mobile parcel delivery app was leaking peopleβs delivery data to others using the app, a security researcher discovered.
π΄ Microsoft Defender ATP Brings EDR Capabilities to macOS π΄
π Read
via "Dark Reading: ".
Mac computers will now have the option to use Microsoft Defender Advanced Threat Protection's endpoint and detection response.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading