Tag: Daily Summary

IT Security News Daily Summary 2020-10-12

Tricks That Will Keep Your Tech in Perfect Condition Activists Need to Take Digital Security Seriously 9 Most Important Tips for Cleaning Your Mac 3D Printing: Offering Solutions to Cyber Crime Video Editor Tools to Make Killer YouTube Videos Reducing…

IT Security News Daily Summary 2020-10-12

Apple T2 Chip Security Vulnerability turns serious Secure Your In-Home IoT | Avast Ransomware: How to Avoid the Dangerous Wave of Attacks Cloudflare Launches New Zero Trust Networking, Security Platform Cybersecurity budget relies on planning and negotiation The Fascinating Paradox…

IT Security News Daily Summary 2020-04-14

Will Gentler HIPAA Rules on Telehealth Now Protect Us From Breach Litigation Later? Microsoft Patches 113 Bugs, 4 Under Active Attack Backbencher Demands Halt Of Chinese Takeover Of Imagination Technologies Concept Imagines Augmented Reality Apple Card That Shows Balance Info…

IT Security News Daily Summary 2020-04-13

US consumers report $12M in COVID-19 scam losses since January Apple Sends Letter to Senators Confirming Privacy and Security of COVID-19 App The end of passwords: Industry experts explore the possibilities and challenges Shift Well-Architecture Left. By Extension, Security Will…

IT Security News Daily Summary 2020-04-10

New Variant of Ploutus ATM Malware Observed in the Wild in Latin America Threat Roundup for April 3 to April 10 How to enable SMS verification code autofill in Android Detect large-scale cryptocurrency mining attack against Kubernetes clusters Friday Squid…

IT Security News Daily Summary 2020-04-09

Twitter Removes Privacy Option, and Shows Why We Need Strong Privacy Laws Google, Microsoft talk up security after Zoom firestorm Why Hybrid Cloud Environments Require More Than Just First-Generation IDaaS Solutions Video: Deepfakes – A Technical Peek Behind the Curtain…

IT Security News Daily Summary 2020-04-06

AFGE head: Federal managers are exacerbating pandemic risks A Brisk Private Trade in Zero-Days Widens Their Use Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims’ computers 5 ways to prevent Zoom bombing Building…

IT Security News Daily Summary 2020-04-05

New Microsoft Edge features will make you more productive Maldoc XLS Invoice with Excel 4 Macros, (Sun, Apr 5th) Firefox zero day in the wild: patch now! Popular OGUsers hacking forum breached for the second time in a year Digital…

IT Security News Daily Summary 2020-04-04

New Coronavirus-themed campaign spread Lokibot worldwide Sophisticated COVID-19–Based Phishing Attacks Leverage PDF Attachments and SaaS to Bypass Defenses DOJ Says Zoom-Bombing is Illegal, Could Lead to Jail Time Hacker defaces Escrow.com by hacking GoDaddy employee’s account New Magecart Skimmer Compromised…

IT Security News Daily Summary 2020-04-03

Digital gamer guide: 10 tips to help new online players Mozilla Patches Critical Vulnerabilities in Firefox, Firefox ESR Telecom networks keeping up, stepping up UK debunks 5G-coronavirus link after conspiracy theorists burn cell tower Unexpected Inflection Point Fraud prevention startup…

IT Security News Daily Summary 2020-04-02

IRS outlines expanded flexible work schedule Google Squashes High-Severity Flaws in Chrome Browser How Humans “LEAD” the Way to More Effective Use of Threat Intelligence How to protect yourself from coronavirus phishing threats Bad Bots Build Presence Across the Web…

IT Security News Daily Summary 2020-04-01

North Korea-linked Geumseong121 APT group is sending spear-phishing emails to target people interested in North Korean refugees Patrick Wardle drops new zero-day doom for Zoom Attackers can use Zoom to steal users’ Windows credentials with no warning You might want…

IT Security News Daily Summary 2020-03-31

FBI warns on Zoom conference security Azure AD Without a Local Server What DOD can learn from TIC modernization COVID-19 Phishing Update: Email Posing as Scam Guidance Delivers Malware Instead FCC tells US telcos to implement caller ID authentication by…

IT Security News Daily Summary 2020-03-30

Testing Brydge’s New Pro+ Keyboard With Trackpad for iPad Pro Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations RangeForce Offers Special Browser-Based, Hands-on Simulated Cybersecurity Learning as a Service to Any College FBI Warns of Ongoing Zoom-Bombing Attacks on Video…

IT Security News Daily Summary 2020-03-28

Hackers sending malware infected USBs with Best Buy Gift Cards Europol: Criminals Exploit Virus Crisis as Fresh Opportunity Talking Mental Health in a Remote World with Greg Keller and Brad Feld Tekya Malware Targets 1 Million Android Users Through Malicious…

IT Security News Daily Summary 2020-03-27

CASB+Is Essential Infrastructure for The Cloud Mobile Digital Transformation No, Microsoft isn’t killing the Control Panel off just yet FTC Warns VoIP Providers to Stop Facilitating Coronavirus Scams Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected…

IT Security News Daily Summary 2020-03-26

2020-03-26 – information_03_26.doc pushes ZLoader Ryuk Ransomware Keeps Targeting Hospitals During the Pandemic Apple Offering 90-Day Free Trials for Final Cut Pro X and Logic Pro X An Elite Spy Group Used 5 Zero-Days to Hack North Koreans How to…

IT Security News Daily Summary 2020-03-25

Insurance Giant Munich Re Invests in Rogue Device Mitigation Firm Sepio Systems How Recovered COVID-19 Patients Might Help Fight the Pandemic The Feds Can Stop Patent Trolls from Endangering COVID-19 Testing and Treatment China-linked APT41 group exploits Citrix, Cisco, Zoho…

IT Security News Daily Summary 2020-03-24

HPE Warns of New Bug That Kills SSD Drives After 40,000 Hours WildPressure, a new APT group targets the Middle East’s industrial sector How Attackers Could Use Azure Apps to Sneak into Microsoft 365 The US Army Corps of Engineers…

IT Security News Daily Summary 2020-03-23

How I Became a Security Consultant: AbsoluteAppsec Interview Microsoft Publishes Advisory for Windows Zero-Day Five Tips for Fraud Prevention Month A Standard Finally Bridges the Gap PCI Compliance from home Is Data Loss Prevention (DLP) Really Dead? Tech Giant GE…

IT Security News Daily Summary 2020-03-22

Apple Shares New Support Document Addressing Distorted Screen Issue on Macs Running Windows 10 Cisco Addressed Multiple High-Risk Vulnerabilities In SD-WAN Solution Keepnet Labs accidentally exposed an unprotected database with 5 Billion previously leaked records Israel Govt’s New ‘Shield’ App…

IT Security News Daily Summary 2020-03-21

A Green Database The Power of Purple Create Remote User Deployments and Security Nearly Instantly with Secure Desktop as a Service (DaaS) Honeypot – Scanning and Targeting Devices & Services, (Sat, Mar 21st) New Coronavirus-themed attack uses fake WHO chief…

IT Security News Daily Summary 2020-03-20

Databricks bolsters security for data analytics tool Apple TV+ Streaming Quality Lowered in Europe to Reduce Network Strain Finastra, World’s Third Largest Fintech, Hit by Ransomware 200M Records of US Citizens Leaked in Unprotected Database COVID-19 affects everyone: we’re here…

IT Security News Daily Summary 2020-03-19

WHO Chief Impersonated in Phishing to Deliver HawkEye Malware Rogers Data Breach Exposed Customer Info in Unsecured Database Misconfigured Elasticsearch Instance Exposes More Than 5 Billion Records ‘Dirty little secret’ extortion email threatens to give your family coronavirus Sodinokibi Ransomware…

IT Security News Daily Summary 2020-03-18

Agencies stress workflow, cyber basics in telework blitz Dear Adobe, Trend Micro users: Please vaccinate your software – at least some of these security holes were exploited in the wild Trump inches closer to exercising powers over medical supply chain…

IT Security News Daily Summary 2020-03-17

Operators behind Nefilim Ransomware threaten to release stolen data Firefox Password Manager To Be Secured With Windows 10 Credentials Coronavirus Widens the Money Mule Pool A COVID-19 Cybersecurity Poll: Securing a Remote Workforce This Stalkerware Delivers Extra-Creepy Features Remote work…

IT Security News Daily Summary 2020-03-16

Most ransomware attacks take place during the night or over the weekend 2020-03-16 – More Hancitor malspam using Covid-19/coronavirus theme National Security Highlights from the Eleventh Democratic Debate Triangulation fraud: coming to an eCommerce site near you When Developing from…

IT Security News Daily Summary 2020-03-15

Eliminate Identity Silos from Azure AD Coronavirus Guidance from Our Nation’s Governors and State CIOs Folding@Home Now Has 23 Coronavirus Projects, Donate CPU Power! DEF CON 27 Monero Village – Sarang Noether PhD’ ‘If You Like It Put a Ring…

IT Security News Daily Summary 2020-03-14

White House looks to curtail U.S. travel for feds Phishing PDF With Incremental Updates., (Sat, Mar 14th) DOD halts domestic travel for its personnel through May 11 Some Apple Employees Say Company’s Culture of Secrecy Makes Working From Home Challenging…

IT Security News Daily Summary 2020-03-13

Boost manufacturing security with a vendor access management strategy Beware scams exploiting coronavirus fears 2020-03-13 – Quick post: Qakbot infection How hospital CIOs can prepare for the onslaught of coronavirus patients Emsisoft Emergency Kit 2020.3.2 beta T-Mobile Offering Unlimited Smartphone…

IT Security News Daily Summary 2020-03-12

Open Exchange Rates Data Breach Affects Users of Well-Known Orgs Russia-Based Turla APT Group’s Infrastructure, Activity Traceable New Feature: Automated Migration from AD to JumpCloud Thought you were done after Tuesday’s 115-fix day? Not yet: Microsoft emits SMBv3 worm-cure crisis…

IT Security News Daily Summary 2020-03-11

ForgeRock Secure Sharing Ingredients: Who, What and How Google Chrome Gets ‘Default to Guest’ Mode for Stateless Browsing How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins Five ways cyberattacks put manufacturing systems at risk Cyberspace Solarium Commission…

IT Security News Daily Summary 2020-03-10

Apple Postpones Alleged March Product Event Amid Coronavirus Restrictions Microsoft March 2020 Patch Tuesday Fixes 115 Vulnerabilities Your VPN or ad-blocker app could be collecting your data Critical Bugs in Rockwell, Johnson Controls ICS Gear Revisiting Program Execution DEF CON…

IT Security News Daily Summary 2020-03-09

How Microsoft Disabled Legacy Authentication Across the Company Google Play Protect Miserably Fails Android Protection Tests Former CIA employee Joshua Schulte was convicted of only minor charges AMD, boffins clash over chip data-leak claims: Side-channel holes revealed in decade of…

IT Security News Daily Summary 2020-03-08

Directory Users and Computers Reporting Tim Cook Offers Work From Home to Most Apple Staff Amid Coronavirus Concerns The City of Durham shut down its network after Ryuk Ransomware attack DEF CON 27, Packet Hacking Village – Matt Nash’s ‘Head…

IT Security News Daily Summary 2020-03-07

DEF CON 27, Packet Hacking Village -Russell Butturini’s ‘Phishing Freakonomics’ XKCD ‘Business Greetings’ How to Use Google Chrome Extensions and Themes in Microsoft Edge A list of security conferences canceled or postponed due to coronavirus concerns Ransomware Threatens to Reveal…

IT Security News Daily Summary 2020-03-06

Friday Squid Blogging: The Effect of Noise on Squid Don’t be fooled, experts warn, America’s anti-child-abuse EARN IT Act could burn encryption to the ground How the coronavirus is changing tech and 5 things to do about it 7 Cloud…

IT Security News Daily Summary 2020-03-05

Man hacks Indian tech support scam call center; leaks CCTV footage Mimecast tracks growing Malware-as-a-Service trend in analysis of 202 billion emails How to install and use the NordPass password manager on Linux Apple Still Owes Caltech $838 Million as…

IT Security News Daily Summary 2020-03-04

US Lawmakers Told of Security Risks From China-owned TikTok Ryuk Ransomware Attacked Epiq Global Via TrickBot Infection Apple Retail Stores Warned About Replacement iPhone Shortages Due to Coronavirus .ORG Isn’t Broken, and We Don’t Need Private Equity to ‘Fix’ It…

IT Security News Daily Summary 2020-03-03

Hackers are using Word documents to drop NetSupport Manager RAT Gotta Patch ‘Em All? Not Necessarily, Experts Say Integration at the Heart of Everything Investing in as-a-service to light a SPARC under IT modernization Going viral: Considerations for agency tech…

IT Security News Daily Summary 2020-03-01

Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm AFGE member alleges ex-president abused her adult son for years IT Security News Daily Summary 2020-02-29 Chrome and Firefox Extension Lets You View Deleted Web Pages DEF CON…

IT Security News Daily Summary 2020-02-29

Chrome and Firefox Extension Lets You View Deleted Web Pages DEF CON 27, Artificial Intelligence Village – Tal Leibovich’s & Shimon Noam Oren’s ‘From Noisy Distorted Data Sets To Excellent Prediction Models’ XKCD ‘Stargazing 3’ DEF CON 27, Artificial Intelligence…

IT Security News Daily Summary 2020-02-28

Friday Squid Blogging: Squid Eggs RSA Conference panel tackles Huawei security risks New Trickbot Delivery Method Focuses on Windows 10 FCC Proposes to Fine Wireless Carriers $200M for Selling Customer Location Data Microsoft antivirus software for Android, iOS a reflection…

IT Security News Daily Summary 2020-02-23

DEF CON 27, Artificial Intelligence Village – Jesus Solano’s ‘Behavioral Biometrics And Context Analytics’ From The Archive: Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 105’ DEF CON 27, Artificial Intelligence Village – Angelo Oliveira’s ‘Fighting Malware…

IT Security News Daily Summary 2020-02-22

Report: FedRAMP must evolve to meet demand, emerging tech DEF CON 27, Artificial Intelligence Village – Anna Skelton’s ‘Deep Fakes, Deep Trouble: Analyzing The Effects of Deepfakes On Market Manipulation’ DEF CON 27, Artificial Intelligence Village – Barton Rhodes’ ‘Securing…

IT Security News Daily Summary 2020-02-21

Top 9 Windows Server Roles and their Alternatives EFF Calls For Disclosure of Secret Financing Details Behind $1.1 Billion .ORG Sale, Asks FTC To Scrutinize Deal SSL Certificate Validity Will Be Limited to One Year by Apple’s Safari Browser Friday…

IT Security News Daily Summary 2020-02-20

Google Bans 600 Android Apps for Obnoxious Ads Attorney General: Facebook Could Potentially Be Held Liable For User Posts New Azure Firewall certification and features in Q1 CY2020 TSA shines a light on insider threats New Ponemon Survey — Why…

IT Security News Daily Summary 2020-02-19

US Questions Tech Firm Liability Exemption For User Posts User Have Risky Security Habits, but Security Pros Aren’t Much Better Microsoft Adds Enterprise Windows 10 Tamper Protection Controls U.S. Pipeline Disrupted by Ransomware Attack 2020-02-19 – Trickbot gtag wecan23 infection…

IT Security News Daily Summary 2020-02-18

FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter Augmented reality headset is the breakout star of Army’s 2021 budget request Users can now remove xHelper, the irremovable malware CoStar Group | Customer Case Study Hackers Attack IOTA’s Trinity Wallet, Company…

IT Security News Daily Summary 2020-02-17

Microsoft to deploy ElectionGuard voting software for the first time tomorrow The Consumer Data Right from Westpac’s perspective What are the cybersecurity benefits of zero trust? FC Barcelona and the International Olympic Committee Twitter accounts hacked Your Cloud Journeys is…

IT Security News Daily Summary 2020-02-16

NSW man faces charges of unauthorised accessed to data Tech-augmented democracy is about to get harder in this half-baked world Australian cyber policy-makers to face Audit Office probe Windows 10X to Feature Faster Updates, Win32 Apps Support Targeted Phishing Attack…

IT Security News Daily Summary 2020-02-15

NextMotion plastic surgery tech firm data leak PhotoSquared app leaks photos & home addresses of 100,000s of users DEF CON 27, Crypto And Privacy Village – Riana Pfefferkorn’s ‘Compelled Device Decryption And The Fifth Amendment’ DEF CON 27, Crypto And…

IT Security News Daily Summary 2020-02-12

FBI: Business Email Compromise Cost Businesses $1.7B in 2019 Nexus Intelligence Insights CVE-2020-2100: Jenkins – UDP Amplification Reflection Attack Leading to Distributed Denial of Service (DDoS) WordPress Cookie Consent Plugin Fixes Critical Flaw for 700K Users Siemens fixed multiple DoS…

IT Security News Daily Summary 2020-02-11

FedRAMP moves toward formal authorization Emotet Trojan now exploits WiFi networks to infect Windows devices DEF CON 27, Crypto And Privacy Village – Cathie Yun’s ‘Implementing A Zero Knowledge Proof’ If you’re running Windows, I feel bad for you, son.…

IT Security News Daily Summary 2020-02-10

Unique Illinois Privacy Law Leads to $550M Facebook Deal White House floats 1% pay raise for civilian feds in 2021 budget Some Democrats Lead Trump in Campaign Domain-Security Efforts Kubernetes rollouts: 5 security best practices Israel’s Entire Voter Registry Exposed…

IT Security News Daily Summary 2020-02-09

Kuo Warns of Delays and Low Labor Return Rates at Apple Supplier Factories in China Due to Coronavirus Everything You Need to Know About the Apple Pencil Emergency call service in Australia to use AI to detect signs of heart…

IT Security News Daily Summary 2020-02-08

XKCD ‘Tax AI’ Microsoft’s Surface Duo Spotted in the Wild, Video Leaked Microsoft’s Surface Duo Spotted in the Wild DEF CON 27, Recon Village – Anthony Rose’s ‘Hack To Basics: Adapting Exploit Frameworks To Evade Microsoft ATP’ Upcoming Low-Cost iPhone…

IT Security News Daily Summary 2020-02-07

Wacom Tablet Data Exfiltration Raises Security Concerns DEF CON 27, Recon Village – Mitchell Parker’s ‘Building OSINT And Recon Program To Address Healthcare’ Friday Squid Blogging: An MRI Scan of a Squid’s Brain Is technology killing globalization? Why Monitoring Third-Party…

IT Security News Daily Summary 2020-02-06

U.S. Homeland Security has used facial recognition on over 43.7 million people The Iowa caucuses app had another problem: It could have been hacked How to use 7zip to encrypt files Japanese Defense Contractors Kobe Steel, Pasco Disclose Breaches New…

IT Security News Daily Summary 2020-02-05

The 11 Best Cyber Security Books — Recommendations from the Experts IoT Malware Campaign Infects Global Manufacturing Sites Governance is key to smooth the adoption of automation DHS looks to automate cyber compliance Army gets tactical with latest cloud pilot…

IT Security News Daily Summary 2020-02-04

Apple TV+ Competitor Disney+ Already Has Over 28 Million Subscribers Microsoft DART Finds Web Shell Threat on the Rise This is not Huawei to reassure people about Beijing’s spying eyes: Trivial backdoor found in HiSilicon’s firmware for net-connected cams, recorders…

IT Security News Daily Summary 2020-02-03

C-Level & Studying for the CISSP 3D map shows how the coronavirus is spreading worldwide Data breach costs hit hard; where are you most vulnerable? Threat intelligence offers promise, but limitations remain Fresh thinking on cybersecurity threats for 2020 Cisco…

IT Security News Daily Summary 2020-02-02

DEF CON 27, Voting Village – Brian Varner’s ‘Beyond the Voting Machine: Other High Value Targets’ The Joy of Tech® ‘Facebook, the Game!’ Cyber Security Roundup for February 2020 DEF CON 27, Recon Village – William Suthers’ ‘PIE HW Based…

IT Security News Daily Summary 2020-02-01

DEF CON 27, Voting Village – Christopher Krebs, Director of DHS’ CISA XKCD ‘Worst Thing That Could Happen’ DEF CON 27, Voting Village – Dr. Linton Salmon’s The DARPA SSITH Program Devious Spamhaus Phishing Scam Warns You’re on an Email…

IT Security News Daily Summary 2020-01-31

Advanced Obfuscation Marks Widespread Info-Stealing Campaign Watch Out for Coronavirus Phishing Scams Evil Corp Returns With New Malware Infection Tactic 10 recommendations for cloud privacy and security with Ponemon research Earn Beacon Gold While Becoming a Ninja at Using Our…

IT Security News Daily Summary 2020-01-30

Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners At hearing, IGs look to curb reprisals against whistleblowers As states prepare for disasters, they acknowledge things will get worse Google open-sources the firmware needed to build hardware security keys 200K…

IT Security News Daily Summary 2020-01-29

Inside the Check Point Research Team’s Investigation Process If you could build an Air Force base from scratch… U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge 25 Must-Know macOS Tips for Beginner, Intermediate…

IT Security News Daily Summary 2020-01-28

FirstNet on track, but could use more transparency, GAO says Do you need certifications to get an InfoSec job? ‘Think different’ about your agency’s cloud migration Running an Eco-friendly IT business California taps utility data to flag cannabis fraud RSA…

IT Security News Daily Summary 2020-01-27

How To Block Bots From Spamming You With Friend Requests Data Telemetry Across Mac, Windows, & Linux Risk managers: Here are the must-have skills for 2020 Spotlight on election security Did H&M spy on its German employees? Privacy watchdog opens…

IT Security News Daily Summary 2020-01-26

XKCD ‘Networking Problems’ DEF CON 27, Voting Village – Kartikeya Kandula’s ‘Unclear Ballot Automated Ballot Image Manipulation’ DEF CON 27, Voting Village – Joseph Marks’ Panel Discussion Universal Directory Replacement Mary Davie: Exit interview Another LastPass Outage After Chrome Extension…

IT Security News Daily Summary 2020-01-25

Interpol Arrests 3 Indonesian Credit Card Hackers for Magecart Attacks Daniel Stori’s ‘To Save The DevOps World’ DEF CON 27, Voting Village – Kate Trimble’s ‘Ideas Whose Time Has Come: CVD, SBOM And SOTA’ PayPal, American Express Phishing Kits Added…

IT Security News Daily Summary 2020-01-24

Friday Squid Blogging: More on the Giant Squid’s DNA Expert released DOS Exploit PoC for Critical Windows RDP Gateway flaws ‘CardPlanet’ Operator Pleads Guilty in Federal Court 7 Steps to IoT Security in 2020 ThreatList: Ransomware Costs Double in Q4,…

IT Security News Daily Summary 2020-01-23

Sophos adds mobile threat defense app to Intercept X line 5 Reasons K-12 School Districts Should Replace Active Directory Prominent dating & menstrual help apps selling your data to 3rd parties FFIEC IT Handbook Updates: Business Continuity Is 2020 Focus…

IT Security News Daily Summary 2020-01-22

Tale of Jailbreaking Disobedient IoT Appliances Shortlisted for the National Canada Reads Prize Vivin Nets Thousands of Dollars Using Cryptomining Malware Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Cards Security clearance backlog continues to drop Safari’s Intelligent Tracking Protection…

IT Security News Daily Summary 2020-01-21

16Shop Phishing Gang Goes After PayPal Users Internet routers running Tomato are under attack by notorious crime gang Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users Senators propose state cyber coordinators Unlocking the Key to the Cloud Block Access…

IT Security News Daily Summary 2020-01-20

How to access your 2FA Docker Hub account from the command line InSecurity Podcast Mixtape: The Year That Was – 2019 Volume One FTCode Ransomware Now Steals Saved Login Credentials CyCognito turning tables by using botnets for good Leaving your…

IT Security News Daily Summary 2020-01-19

End-to-end encryption means Huawei bans are about availability, not interception New Nest Video Extortion Scam Plays Out Like a Spy Game Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0 DEF CON 27, Aviation Village, Dr. Will Roper’s and…

IT Security News Daily Summary 2020-01-18

DEF CON 27, Aviation Village, Karl Koscher’s ‘An Introduction To The ARINC Standards’ Microsoft provides mitigation for actively exploited CVE-2020-0674 IE Zero-Day Gurucul Webinar to Present Roadmap for Implementing a Zero Trust Model How Modern Technology is Making Business Life…

IT Security News Daily Summary 2020-01-17

Imperva Launches New Data Center in Argentina Latest iOS 13.3.1 Beta Includes Toggle for Disabling U1 Ultra Wideband Chip Friday Squid Blogging: Giant Squid Genome Analyzed New JhoneRAT Malware Targets Middle East Amazon Mysteriously Pulls All New Apple Watch Series…

IT Security News Daily Summary 2020-01-16

Cybersecurity Terms and Threats You Need to Know in 2020 Five Mac Apps Worth Checking Out – January 2020 Critical Cisco Flaws Now Have PoC Exploit Cybersecurity firm McAfee names new CEO Google Chrome Adds Protection for NSA’s Windows CryptoAPI…

IT Security News Daily Summary 2020-01-15

Why government is a breeding ground for insider threats Rights Groups to European Commission: Prioritize Users’ Rights, Get Public Input For Article 17 Application Guidelines Cybersecurity front and center in Iran threat hearing What to watch in federal IT in…

IT Security News Daily Summary 2020-01-14

Microsoft’s new tool detects & reports pedophiles from online chats Windows 10 Has a Security Flaw So Severe the NSA Disclosed It Windows Terminal Adds Retro CRT Effects and Console Search VMware Releases Security Update Welcome to the 2020s: Booby-trapped…

IT Security News Daily Summary 2020-01-13

Cryptic Rumblings Ahead of First 2020 Patch Tuesday US officials meet UK peers to remark the urgency to ban Huawei 5G tech Securing Interactive Kiosks IoTs with the Paradox OS Mac Shipments Down in Q4 2019 Amid Overall PC Market…

IT Security News Daily Summary 2020-01-12

New Bill prohibits intelligence sharing with countries using Huawei 5G equipment Sodinokibi Ransomware threats Travelex to release data, if ransom not paid. One More Threat For Organizations – The Ako Ransomware MageCart attack hit Australia bushfire Donors DEF CON 27,…

IT Security News Daily Summary 2020-01-11

BtoBet – 444,241 breached accounts DOD tries to shut down Oracle’s JEDI appeal Why the Air Force put Kubernetes in an F-16 5G powers Air Force ‘smart base of the future’ Cyber Solarium to back CISA as the lead response…

IT Security News Daily Summary 2020-01-10

Maze Ransomware Publishes 14GB of Stolen Southwire Files Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta Threat Roundup for January 3 to January 10 Facebook Says Encrypting Messenger by Default Will Take Years Facebook Again Says It Will Do…

IT Security News Daily Summary 2020-01-09

Making Compliance and Risk Part of DevOps – 2020 Trend #4 Chinese Malware Found Preinstalled on US Government-Funded Phones Google scolded for depriving the poor of privacy after Chinese malware bundled on phones for hard-up Americans Peter Thomas Kirstein, CBE,…

IT Security News Daily Summary 2020-01-08

Do federal agencies need to collect more data from social media platforms? More antitrust probes of government procurement likely, thanks to new task force The city of Las Vegas announced it has suffered a cyber attack Hash snag: Security shamans…

IT Security News Daily Summary 2020-01-07

CISA cautions on Iran threats That Pulse Secure VPN you’re using to protect your data? Better get it patched – or it’s going to be ransomware time Medical info of 49,351 patients exposed in Alomere Health hospital breach DEF CON…

IT Security News Daily Summary 2020-01-06

Insight Partners Acquires IoT Security Firm Armis at a $1.1 Billion Valuation Researchers unearth malicious Google Play apps linked to active exploit hackers CES 2020: Sony Unveils New 4K and 8K TVs with HomeKit and AirPlay 2 Support Malicious Google…

IT Security News Daily Summary 2020-01-05

Kali Linux Announced New Kali 2020.1 Comes With “Non-Root Users By Default” US Restaurant Chain Landry Discloses POS Malware Attack 5 Best Cybersecurity Practices for Your Offshore Development Team Austria’s foreign ministry is facing a ‘serious cyberattack’ 5 predictions for…

IT Security News Daily Summary 2020-01-04

U.S. CISA Agency warns of possible cyber attacks from Iran Iranian Cyberattacks Feared After Killing of Top General Google Chrome Extension, Shitcoin Wallet found stealing passwords and crypto-wallet keys Shitcoin Wallet Extension Isn’t A Crypto Wallet But A Crypto Stealer…

IT Security News Daily Summary 2020-01-03

Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico India’s Reaction to the Killing of Iranian Commander Qassem Soleimani Clop Ransomware Now Kills Windows 10 Apps and 3rd Party Tools Iran could conduct cyberattacks as retaliation Did the…

IT Security News Daily Summary 2020-01-02

Mysterious Drones Are Flying over Colorado IoT Company Wyze Discloses Data Leak Affecting 2.4 Million Users Ransomware Scuttles Coast Guard Facility for 30+ Hours Responders get hands-on look at latest tech Reflections on an Amazing 2019 at Balbix Maze Ransomware…

IT Security News Daily Summary 2020-01-01

Yeast-raised Apple Cider Doughnuts “Nim httpclient/1.0.4”, (Wed, Jan 1st) The Law and Consequences of the Recent Airstrikes in Iraq Mariah Carey ‘s Twitter Hacked on New Year’s Eve We Trust Blockchain Says the Card Payment Industry – But Why Still…