-
Lions and Tigers and a December Full of Adversary Activity – Oh My!
-
Apple’s New Privacy-Focused Tracking Prompt Begins Appearing in iOS 14.4 Beta
-
Cloud, off-the-shelf gaming equipment expands flight training options
-
Microsoft, McAfee, Rapid7, and Others Form New Ransomware Task Force
-
Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack
-
Roanoke College Forced to Delay Spring Semester After Cyber-Attack
-
Fashion marketplace giant 21 Buttons exposes millions of users’ data
-
CISA Releases CISA Insights and Creates Webpage on Ongoing APT Cyber Activity
-
Analysis Dridex Dropper, IoC extraction (guest diary), (Wed, Dec 23rd)
-
Security measures critical for COVID-19 vaccine distribution
-
Attackers Use Mobile Emulators on an Unprecedented Scale to Steal Millions of Dollars in a Few Days
-
Fact vs. Fiction: Film Industry’s Portrayal of Cybersecurity
-
US COVID-19 relief bill to make copyrighted content streaming a felony
-
CISA warns that SolarWinds software may not be only entry point in latest breaches
-
Critical Flaws in Kepware Products Can Facilitate Attacks on Industrial Firms
-
Europol and Eurojust sign new contribution agreement expanding cooperation on the SIRIUS project
-
DHS Warns Against Using Chinese Hardware And Digital Services
-
No emails have leaked from the 2020 election campaigns yet — tiny USB sticks may be one reason why
-
Bitglass Security Spotlight: Popular Messaging App Exposes Users’ Private Data.
-
Power in a Small Package: EF300 Entry Tier NVMe System is Newest Member of the E-Series Family
-
Deals: Christmas Week Sales Include Lowest-Ever Prices on M1 MacBook Pro, iMac, and More
-
I played the free online games your kids are playing and here’s what happened
-
WORKFORCE STUDY: REVIEWING CYBERSECURITY’S PANDEMIC RESPONSE
-
Let’s Encrypt comes up with workaround for abandonware Android devices
-
How to make a QR code to accept Bitcoin while keeping it secure
-
How to address security fatigue and stop cybercriminals from winning
-
Police bring down “bulletproof” VPN services beloved by cybercriminals
-
Forums, Marketplaces, and Shops Remain Essential Venues for the Criminal Economy
-
Apple to Fix Resolution Issue With Ultrawide Displays on M1 Macs in Future macOS Update
-
Fact vs. Fiction: Film Industry’s Portrayal of Cybersecurity
-
ACLU Sues FBI to Learn How It Obtains Data From Encrypted Devices
-
Apple Starts Accepting Developers Into Small Business Program
-
China and the U.S. Make Antitrust Moves Against Domestic Tech Giants
-
Millions of Devices Affected by Vulnerabilities Used in Stolen FireEye Tools
-
Ransomware: Attacks could be about to get even more dangerous and disruptive
-
Facebook Employees Criticize Campaign Against Apple in Leaked Comments
-
Leaky Server Exposes 12 Million Medical Records to Meow Attacker
-
US: Buying Chinese Tech is a “Grave Threat” to Your Data Security
-
How to Defend Against Malware, Phishing, and Scams During COVID-19 Crisis
-
Looking for adding new detection technologies in your security products?
-
Law Enforcement Seizes Joker’s Stash — Stolen Credit Card Marketplace
-
New Critical Flaws in Treck TCP/IP Stack Affect Millions of IoT Devices
-
As technology develops in education so does the need for cybersecurity
-
Tech’s bigger role in pharma industry demands stronger security measures
-
How to enhance onboarding for digital banking services using risk management
-
Card-Not-Present Fraud: 4 Security Considerations for Point of Sale Businesses
-
U.S. Government Warns of Phishing, Fraud Schemes Using COVID-19 Vaccine Lures
-
Experts listed the possible goals of cyber criminals who hack websites
-
Comms Alliance argues TSSR duplicates obligations within Critical Infrastructure Bill
-
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”
-
DHS warns against using Chinese hardware and digital services
-
Arista Networks Attack Surface Assessment: AI-driven threat hunting and incident response expertise
-
Rapid website-blocking power for violent material proposed for eSafety Commissioner
-
Sysdig meets the SOC 2 standards for security and availability
-
Apple Sending Special iPhones to First Participants in Security Research Device Program
-
Cybersecurity breach is worrying considering years of security efforts: Expert
-
Don’t let a data breach sink your business: Here’s what you need to know
-
SolarWinds Campaign Focuses Attention on ‘Golden SAML’ Attack Vector
-
Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon Linux
-
Firefox continues cracking down on tracking with cache partitioning
-
Signal app’s on-device encryption can be decrypted, claims hacking firm Cellebrite
-
iPhone Calendar Events spam is back: Here’s how to get rid of it
-
Announcing the General Availability of Container Security in the VMware Carbon Black Cloud
-
50 orgs ‘genuinely impacted’ by SolarWinds hack, FireEye chief says
-
Robots for kids: STEM kits and more tech gifts for hackers of all ages
-
Elon Musk Claims He Once Reached Out to Tim Cook About Tesla Purchase But Was Refused Meeting
-
A quiet, steady communications revolution has radically improved response in public safety
-
Rumors Persist of New Apple TV With Stronger Gaming Focus, Updated Remote, and Faster Chip Next Year
-
The New IOT Security Act Shows the Limits of Congressional Policymaking for Cybersecurity
-
Two groups might have breached SolarWinds Orion software- Microsoft
-
UK lawmakers propose law banning retail bots after PS5 fiasco
-
The CASE Act Is Just the Beginning of the Next Copyright Battle
-
Phishing Campaign Impersonates New York Department of Labor to Steal Private Information
-
U.S. Seizes Domains Used for COVID-19 Vaccine Phishing Attacks
-
New marketing campaign against UK subway by using TrickBot malware
-
Developer Successfully Emulates Nintendo Switch Games on M1 Mac
-
Dubber acquires Speik to expand its AI call-recording service
-
Does a friend “need money urgently”? Check your facts before paying out…
-
This Disastrous Copyright Proposal Goes Straight to Our Naughty List
-
How to achieve cost savings with cloud management optimisation
-
How to enhance access to digital banking with risk management
-
‘Tis the season for session hijacking – Here’s how to stop it
-
Tech Giants Lend WhatsApp Support in Spyware Case Against NSO Group
-
Tech Giants Show Support for WhatsApp in Lawsuit Against Spyware Firm
-
Cybercriminals’ Favorite Bulletproof VPN Service Shuts Down In Global Action
-
U.S. House Intel Chair Wants Briefing On Recent Hacking Campaign
-
Trump Administration Says Russia Behind SolarWinds Hack. Trump Himself Begs To Differ
-
Expert Reaction On Microsoft Says It Identified 40+ Victims Of The SolarWinds Hack
-
Experts Reacted On Microsoft Confirming Breached In Recent SolarWinds Supply Chain Hack
-
Trucking And Freight Company Forward Air Suffered Ransomware Attack
-
VPN Service Used by Cybercriminals Disrupted in Global Law Enforcement Operation
-
Firefox 85 to Bring Full Network Partitioning to Block Most User Tracking Efforts
-
The Ministry of Internal Affairs of Russia is creating a cyber police
-
Security as Code: How Repeatable Policy-Driven Deployment Improves Security
-
Wake on LAN with IP address manager: A holistic approach to remote booting
-
2021 Security Crystal Ball: Trends and Predictions for the Year Ahead
-
WFCM 1.7.0: new file integrity checks & detailed email notifications
-
Bulletproof VPN services took down in a global police operation
-
Netatmo Video Doorbell With HomeKit Now Available to Order in U.S. and Canada, Ships Early January
-
Ask Lawfare: A Special Year-End Edition of the Lawfare Podcast
-
The Military Waiver Requirement for Secretary of Defense Shouldn’t Substitute Individuation
-
Sen. Wyden: Dozens of Treasury Department email accounts were hacked during cyberattack
-
How to combat future cyberattacks following the SolarWinds breach
-
Ministry of Justice Suffers 17 Serious Data Breaches Last Year
-
Security Intelligence Handbook Chapter 5: How Security Intelligence Drives Proactive Response
-
Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks
-
CISA Issues ICS Advisory for New Vulnerabilities in Treck TCP/IP Stack
-
Gartner Ranks Radware #1 for API & High Security Use Cases in 2020 Critical Capabilities Report
-
Cybersecurity Consultant: Are More CISSPs Embracing the Gig Economy?
-
Android security: Analysis, advice, and next-level knowledge
-
Google, Facebook Team Up To Tackle Antitrust Lawsuit – Report
-
Critical Dell Wyse Bugs Let Attackers to Execute Code and Access Files and Credentials
-
Farmers get their own security advice as cyberattacks increase
-
SolarWinds Claims Execs Unaware of Breach When They Sold Stock
-
Cybereason Adopts Oracle Cloud Infrastructure to Enhance its Platform Security
-
iPhones of Al Jazeera Journalists Being Snooped On Via Israeli Firm’s Spyware
-
How to Build Successful Security Awareness Training Programs in 2021 and Beyond
-
$10 Credit Cards, $2 PayPal Accounts + More Findings From VMware Carbon Black – Expert Insight
-
Google, Facebook Team Up To Tackle Antitrust Lawsuits – Report
-
Servers of Carding Site “Joker’s Stash” Seized by Law Enforcement
-
Malware Victim Selection Through WiFi Identification, (Tue, Dec 22nd)
-
Expert Says SolarWinds Cyber-Attack Serves Important Password Security Reminder
-
The 4 Key Security Gaps Every Security Team Needs To Close In 2021
-
Expert Insight On Flavors Designer Symrise Ransomware Attack
-
Just released! AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge
-
6 board of directors security concerns every CISO should be prepared to address
-
Microsoft and Google join Facebook’s legal battle against hacking company NSO
-
A Second Hacker Group May Have Also Breached SolarWinds, Microsoft Says
-
Microsoft and McAfee headline newly-formed ‘Ransomware Task Force’
-
Trukno: “On A Mission To Deliver Cyber Intelligence, Not Cyber News”
-
Three reasons why context is key to narrowing your attack surface
-
EFF to Ninth Circuit: Don’t Grant Immunity to Notorious Spyware Company
-
Detecting SUNBURST/Solarigate activity in retrospect with Zeek – a practical example
-
Operational planning simulation for defense against an attacking drone swarm
-
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
-
You Think You’re Prepared for the Next SolarWinds. You Are Not.
-
ColorTokens Partner Program: Content, tools, and training in ColorTokens’ Zero Trust approach
-
D-Link Layer 3 Stackable 10G Managed Switches offer high scalability, availability, and redundancy
-
Tufin Orchestration Suite R20-2: Users can evaluate network access risks and minimize attack surface
-
Microsoft, Google, Cisco, and others file amicus brief in support of Facebook’s NSO lawsuit
-
Cognizant acquires Inawisdom to help businesses improve business outcomes
-
uCloudlink and Vodafone extend partnership on data procurement
-
Software factories are new ‘crown jewels,’ Air Force official says
-
OneLogin expands leadership team with the appointment of two new members
-
May Mitchell joins iboss as Senior Vice President of Marketing
-
Zero-click iMessage zero-day used to hack the iPhones of 36 journalists
-
Security experts warn of long-term risk tied to Energy Department breach
-
Apple is allegedly working on a passenger car, breakthrough battery tech
-
What we know about the new SARS strain that’s shutting down the UK
-
The U.S. Government Is Targeting Cryptocurrency to Expand the Reach of Its Financial Surveillance
Generated on 2020-12-23 23:55:11.681815