Monthly Archives: November 2018
Marriott Suffers Massive Breach – Affects 500 Million Customers
The personally identifiable information (PII) of as many as 500 million guests at Starwood hotels has been compromised and Marriott said that it’s discovered that unauthorized access within its Starwood […]
Malicious developer distributed tainted version of Event-Stream NodeJS Module to steal Bitcoins
Hacker compromised third-party NodeJS module “Event-Stream” introducing a malicious code aimed at stealing funds in Bitcoin wallet apps. The malicious code was introduced in the version 3.3.6, published on September 9 via […]
Going From One Against Many to Many Against Many: The Future of Security Collaboration
Industry-wide, security teams are duplicating time and resources to complete similar investigations, workflows and threat responses. With a skilled staffing shortage of an anticipated 3.5 million security jobs by 2021, […]
VMware fixed Workstation flaw disclosed at the Tianfu Cup PWN competition
VMware released security updates to address a vulnerability (CVE-2018-6983) that was recently discovered at the Tianfu Cup PWN competition. VMware released security updates to address a vulnerability (CVE-2018-6983) that was […]
It’s Cyber Monday every day at Regent University’s cyber range
Cyberattacks affect the lives of everyone, from business owners required to safeguard assests and data to children growing up with tablets in their hands. It’s a reality reinforced daily with […]
US Government is asking allies to ban Huawei equipment
US Government is inviting its allies to exclude Huawei equipment from critical infrastructure and 5G architectures, reports the Wall Street Journal The Wall Street Journal reported that the US Government is urging its […]
Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
Hackers targeted Drupal web servers chaining some known vulnerabilities, including Drupalgeddon2 and DirtyCOW issues. Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw […]
How to Improve Security and Efficiency for Your File Transfers
Security continues to be top of mind for those in the business of keeping their company’s data out of the wrong hands. To learn where organizations are in their security […]
CarsBlues Bluetooth attack Affects tens of millions of vehicles
The CarsBlues attack leverages security flaws in the infotainment systems installed in several types of vehicles via Bluetooth to access user PII. A new Bluetooth hack, dubbed CarsBlues, potentially affects […]
Instagram glitch exposed some user passwords
Instagram has suffered a serious security leak that might have exposed user’s passwords, revealed The Information website. Instagram notified some of its users that it might have accidentally exposed their […]
Cyber Defense Magazine and Yale University partner on scholarship for Yale Cyber Leadership Forum
Legal, technology, and business professionals in need will have once in a lifetime opportunity to apply for full-tuition scholarship to attend intensive 3-day program Cyber Defense Magazine (CDM), in partnership with […]
WatchGuard Technologies 2019 Security Predictions
“Cyber criminals are continuing to reshape the threat landscape as they update their tactics and escalate their attacks against businesses, governments, and even the infrastructure of the internet itself,” said […]
Boffins discovered seven new Meltdown and Spectre attacks
Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient execution. In January, white hackers from Google Project Zero disclosed the vulnerabilities that […]
Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
Security firm Cylance has uncovered a sophisticated state-sponsored campaign, tracked as Operation Shaheen, against the Pakistan Air Force. According to the experts the campaign was carried out by a nation-state […]
November Patch Tuesday Update
This Month’s Breakdown on Latest Updates from Microsoft and Adobe by Chris Goettl, director of product management, Security, Ivanti I can’t believe it’s November already. My wife is a Christmas […]
Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game
Cyberattacks affect the lives of everyone, from business owners required to safeguard assests and data to children growing up with tablets in their hands. It’s a reality reinforced daily with […]
CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild
Experts at Volexity discovered that a recently patched remote code execution flaw (CVE-2018-15961) affecting the Adobe ColdFusion has been exploited in the wild. Security experts from Volexity reported that attackers in the wild are […]
Reading the Android Ecosystem Security Transparency Report
According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to 0.06% in Pie Google published the first Android Ecosystem Security Transparency Report that […]
Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide
Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic through China. Security researchers Chris C. Demchak and Yuval Shavitt revealed […]
U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program
The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the Air Force 3.0. The United States Air Force launched earlier […]
Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data. The flaws were discovered by researchers Carlo […]
Video Data Security. The view from the experts.
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as […]
Cutting Through the Fog of More
An overheard conversation between a software vendor and a security professional sheds light on a growing problem in the evolving battle to secure critical enterprise data and information. The vendor, […]
Flaw in Icecast streaming media server allows to take off online Radio Stations
Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast of online radio stations. Icecast streaming media server is affected […]
USB drives are primary vector for destructive threats to industrial facilities
USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published on by Honeywell, malware-based attacks against industrial facilities mostly leverage […]
Cyber attack exposes sensitive data about a nuclear power plant in France
A cyber attack on a French firm Ingerop allowed attackers to access confidential documents related to nuclear power plant plans in France. The hacker stole more than 65 gigabytes of […]
Iran hit by a more aggressive and sophisticated Stuxnet version
Iran’s strategic network was hit by a new destructive and sophisticated version of the Stuxnet cyber weapon, the Hadashot TV reports. According to the Hadashot TV, Iran’s strategic network was hit by […]
New Data Affirms Cyber Threat for Industrial Control Systems
Recent CyberX report finds that plain-text passwords, direct internet connections and weak anti-virus protections place industrial control systems at risk for cyberattacks by Phil Neray, VP of Industrial Cybersecurity, CyberX […]
85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections
Ahead of the 2018 US midterm elections, sellers are flooding the cybercrime underground markets with data from voter databases. Experts at cybersecurity company Carbon Black found tens of different state voter databases available for […]
Cyber Risk One-Day Workshop for Executives & Senior Leaders
Regent University is Setting the Standard in Cyber Training & Education Cyber Risk One-Day Workshop for Executives & Senior Leaders Friday, Nov. 16, 2018 | 7:30 AM – 3:30 […]