Yearly Archives: 2018

How to Improve Security and Efficiency for Your File Transfers

Security continues to be top of mind for those in the business of keeping their company’s data out of the wrong hands. To learn where organizations are in their security […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on How to Improve Security and Efficiency for Your File Transfers

CarsBlues Bluetooth attack Affects tens of millions of vehicles

The CarsBlues attack leverages security flaws in the infotainment systems installed in several types of vehicles via Bluetooth to access user PII. A new Bluetooth hack, dubbed CarsBlues, potentially affects […]

Posted in Cyber Security News | Comments Off on CarsBlues Bluetooth attack Affects tens of millions of vehicles

Instagram glitch exposed some user passwords

Instagram has suffered a serious security leak that might have exposed user’s passwords, revealed The Information website. Instagram notified some of its users that it might have accidentally exposed their […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Instagram glitch exposed some user passwords

Cyber Defense Magazine and Yale University partner on scholarship for Yale Cyber Leadership Forum

Legal, technology, and business professionals in need will have once in a lifetime opportunity to apply for full-tuition scholarship to attend intensive 3-day program Cyber Defense Magazine (CDM), in partnership with […]

Posted in Cyber Security News | Comments Off on Cyber Defense Magazine and Yale University partner on scholarship for Yale Cyber Leadership Forum

WatchGuard Technologies 2019 Security Predictions

“Cyber criminals are continuing to reshape the threat landscape as they update their tactics and escalate their attacks against businesses, governments, and even the infrastructure of the internet itself,” said […]

Posted in Cyber Security News | Comments Off on WatchGuard Technologies 2019 Security Predictions

Boffins discovered seven new Meltdown and Spectre attacks

Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient execution. In January, white hackers from Google Project Zero disclosed the vulnerabilities that […]

Posted in Cyber Security News | Comments Off on Boffins discovered seven new Meltdown and Spectre attacks

Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers

Security firm Cylance has uncovered a sophisticated state-sponsored campaign, tracked as Operation Shaheen, against the Pakistan Air Force. According to the experts the campaign was carried out by a nation-state […]

Posted in Cyber Security News | Comments Off on Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers

November Patch Tuesday Update

This Month’s Breakdown on Latest Updates from Microsoft and Adobe by Chris Goettl, director of product management, Security, Ivanti I can’t believe it’s November already. My wife is a Christmas […]

Posted in Cyber Security News | Comments Off on November Patch Tuesday Update

Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game

Cyberattacks affect the lives of everyone, from business owners required to safeguard assests and data to children growing up with tablets in their hands. It’s a reality reinforced daily with […]

Posted in Cyber Security News | Comments Off on Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game

CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild

Experts at Volexity discovered that a recently patched remote code execution flaw (CVE-2018-15961) affecting the Adobe ColdFusion has been exploited in the wild. Security experts from Volexity reported that attackers in the wild are […]

Posted in Cyber Security News | Comments Off on CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to 0.06% in Pie Google published the first Android Ecosystem Security Transparency Report that […]

Posted in Cyber Security News | Comments Off on Reading the Android Ecosystem Security Transparency Report

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic through China. Security researchers Chris C. Demchak and Yuval Shavitt revealed […]

Posted in Cyber Security News | Comments Off on Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the Air Force 3.0. The United States Air Force launched earlier […]

Posted in Cyber Security News | Comments Off on U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data. The flaws were discovered by researchers Carlo […]

Posted in Cyber Security News | Comments Off on Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

Video Data Security. The view from the experts.

Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as […]

Posted in Cyber Security News | Comments Off on Video Data Security. The view from the experts.

Cutting Through the Fog of More

An overheard conversation between a software vendor and a security professional sheds light on a growing problem in the evolving battle to secure critical enterprise data and information. The vendor, […]

Posted in Cyber Security News | Comments Off on Cutting Through the Fog of More

Flaw in Icecast streaming media server allows to take off online Radio Stations

Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast of online radio stations. Icecast streaming media server is affected […]

Posted in Cyber Security News | Comments Off on Flaw in Icecast streaming media server allows to take off online Radio Stations

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published on by Honeywell, malware-based attacks against industrial facilities mostly leverage […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on USB drives are primary vector for destructive threats to industrial facilities

Cyber attack exposes sensitive data about a nuclear power plant in France

A cyber attack on a French firm Ingerop allowed attackers to access confidential documents related to nuclear power plant plans in France. The hacker stole more than 65 gigabytes of […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber attack exposes sensitive data about a nuclear power plant in France

Iran hit by a more aggressive and sophisticated Stuxnet version

Iran’s strategic network was hit by a new destructive and sophisticated version of the Stuxnet cyber weapon, the Hadashot TV reports. According to the Hadashot TV, Iran’s strategic network was hit by […]

Posted in Cyber Security News | Comments Off on Iran hit by a more aggressive and sophisticated Stuxnet version

New Data Affirms Cyber Threat for Industrial Control Systems

Recent CyberX report finds that plain-text passwords, direct internet connections and weak anti-virus protections place industrial control systems at risk for cyberattacks by Phil Neray, VP of Industrial Cybersecurity, CyberX […]

Posted in Cyber Security News | Comments Off on New Data Affirms Cyber Threat for Industrial Control Systems

85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections

Ahead of the 2018 US midterm elections, sellers are flooding the cybercrime underground markets with data from voter databases. Experts at cybersecurity company Carbon Black found tens of different state voter databases available for […]

Posted in Cyber Security News | Comments Off on 85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections

Cyber Risk One-Day Workshop for Executives & Senior Leaders

Regent University is Setting the Standard in Cyber Training & Education   Cyber Risk One-Day Workshop for Executives & Senior Leaders Friday, Nov. 16, 2018 | 7:30 AM – 3:30 […]

Posted in Cyber Security News | Comments Off on Cyber Risk One-Day Workshop for Executives & Senior Leaders

Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. Security expert Antonio Pirozzi, director at ZLab malware lab at Cybaze […]

Posted in Cyber Security News | Comments Off on Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

IBM buys Red Hat for $34 Billion, it is largest software transaction in history

IBM announced it is going to buy the open source company Red Hat for $34bn with the intent to enhance its cloud offerings. This is the biggest tech merger in history involving […]

Posted in Cyber Security News | Comments Off on IBM buys Red Hat for $34 Billion, it is largest software transaction in history

SandboxEscaper expert is back and disclosed a new Windows Zero-Day

The security researcher SandboxEscaper has released the proof-of-concept exploit code for a new Windows zero-day, Windows users are now exposed to attacks. The security researcher using the Twitter handle @SandboxEscaper is back and has released the […]

Posted in Cyber Security News | Comments Off on SandboxEscaper expert is back and disclosed a new Windows Zero-Day

UK ICO fines Facebook with maximum for Cambridge Analytica scandal

Facebook has been fined £500,000 by the UK’s Information Commissioner’s Office (ICO) for the Cambridge Analyticaprivacy scandal that exposed data of 87 million users. The announcement was made by the UK’s […]

Posted in Cyber Security News | Comments Off on UK ICO fines Facebook with maximum for Cambridge Analytica scandal

Breaking News: Securonix Threat Research: British Airways Breach

The data breach suffered by British Airways earlier this year affected around 380,000 customers and resulted in the theft of customer data including personal and financial details. The attack was […]

Posted in Cyber Security News | Comments Off on Breaking News: Securonix Threat Research: British Airways Breach

The new Azorult 3.3 is available in the cybercrime underground market

A new version of the Azorult info-stealer appeared in the wild, it is able to steal more data, including other types of cryptocurrencies A new version of the Azorult info-stealer appeared in the wild, […]

Posted in Cyber Security News | Comments Off on The new Azorult 3.3 is available in the cybercrime underground market

GreyEnergy cyberespionage group targets Poland and Ukraine

Security researchers from ESET published a detailed analysis of a recently discovered cyber espionage group tracked as GreyEnergy. Security experts from ESET published a detailed analysis of a recently discovered […]

Posted in Cyber Security News | Comments Off on GreyEnergy cyberespionage group targets Poland and Ukraine

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X