Yearly Archives: 2018

Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of […]

Posted in Cyber Security News | Comments Off on Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

Beyond GDPR: key cyber security concerns

GDPR has now been in force for over two months and has brought with it a whole new approach to data privacy. Although the idea of protecting peoples’ personal data […]

Posted in Cyber Security News | Comments Off on Beyond GDPR: key cyber security concerns

FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article  The practice of threat intelligence (TI) is gaining momentum, helping organizations of all […]

Posted in Cyber Security News | Comments Off on FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score of 9.9, On Friday, Oracle released security patches to address […]

Posted in Cyber Security News | Comments Off on Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]

Posted in Cyber Security News | Comments Off on DNS Hijacking targets Brazilian financial institutions

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]

Posted in Cyber Security News | Comments Off on DNS Hijacking targets Brazilian financial institutions

Some of the world’s biggest crimes go unnoticed, until it’s too late

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]

Posted in Cyber Security News | Comments Off on Some of the world’s biggest crimes go unnoticed, until it’s too late

Social Mapper – Correlate social media profiles with facial recognition

Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles across different social networks. Security experts at Trustwave have released Social Mapper, a […]

Posted in Cyber Security News | Comments Off on Social Mapper – Correlate social media profiles with facial recognition

Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group chats. WhatsApp, the most popular messaging application in the world, […]

Posted in Cyber Security News | Comments Off on Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by Ramnit operators. Security researchers at Checkpoint security have spotted a massive proxy botnet, […]

Posted in Cyber Security News | Comments Off on Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Duo Security created open tools and techniques to identify large Twitter botnet

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security […]

Posted in Cyber Security News | Comments Off on Duo Security created open tools and techniques to identify large Twitter botnet

A malware paralyzed TSMC plants where also Apple produces its devices

A virus has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the plants where Apple produces its devices A malware has infected systems at several Taiwan Semiconductor […]

Posted in Cyber Security News | Comments Off on A malware paralyzed TSMC plants where also Apple produces its devices

Breaking Down the Door to Emergency Services through Cellular IoT Gateways

If configured incorrectly, cellular IoT gateways can give attacker access to critical infrastructure, threatening human life in ways only Hollywood has conceived. by Justin Shattuck, Scott Harvey, Sara Boddy & […]

Posted in Cyber Security News | Comments Off on Breaking Down the Door to Emergency Services through Cellular IoT Gateways

Russian troll factory suspected to be behind the attack against Italian President Mattarella

The Russian shadow behind the attack on Italian President Mattarella, a coordinated attack via Twitter involved hundreds of profiles inviting him to resign. Cybersecurity experts and Italian media believe that the […]

Posted in Cyber Security News | Comments Off on Russian troll factory suspected to be behind the attack against Italian President Mattarella

BAE Systems to Develop Automated Cyber Defense Tools for DARPA

By combining advanced machine learning and cyber-attack modeling, BAE Systems’ unique solution intends to automatically detect and defeat advanced cyber threats that could currently go undetected The U.S. Defense Advanced […]

Posted in Cyber Security News | Comments Off on BAE Systems to Develop Automated Cyber Defense Tools for DARPA

BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 2018 NETSCOUT Threat Intelligence Report, offering globally scoped internet threat intelligence together with the analysis of our […]

Posted in Cyber Security News | Comments Off on BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats

Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018

Momentum Cyber is proud to release our Cybersecurity Mid-year Review for 2018. The mid-year report examines 1H’18 cybersecurity transactions and identifies trends that are impacting the dynamic and rapidly evolving cybersecurity landscape. […]

Posted in Cyber Security News | Comments Off on Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018

Are Your File Transfers Compliant with Data Security Laws?

It can be challenging to keep up with ever-changing compliance requirements. This year alone, PCI DSS released an update that applied to most organizations in card-processing industries, and the GDPR […]

Posted in Cyber Security News | Comments Off on Are Your File Transfers Compliant with Data Security Laws?

BlackHat 2018: Easily Hacking Cars, Voting Machines, Satellites and Much More!

Black Hat USA now taking place August 4-9, 2018 at the Mandalay Bay Convention Center, offering the largest lineup to date. Deeply technical, hands-on Trainings led by the information security […]

Posted in Cyber Security News | Comments Off on BlackHat 2018: Easily Hacking Cars, Voting Machines, Satellites and Much More!

Reddit discloses a data breach, a hacker accessed user data

Reddit is warning its users of a security breach, an attacker broke into the systems of the platform and accessed user data. Reddit is warning its users of a security […]

Posted in Cyber Security News | Comments Off on Reddit discloses a data breach, a hacker accessed user data

The Impact of SOAR on Incident Response Steps

How automation and orchestration affect NIST’s framework for incident response by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security As cybersecurity incidents such as phishing scams, ransomware attacks, and user […]

Posted in Cyber Security News | Comments Off on The Impact of SOAR on Incident Response Steps

Facebook reported and blocked attempts to influence campaign ahead of midterms US elections

Facebook removed 32 Facebook and Instagram accounts and pages that were involved in a coordinated operation aimed at influencing the midterm US elections Facebook has removed 32 Facebook and Instagram accounts and […]

Posted in Cyber Security News | Comments Off on Facebook reported and blocked attempts to influence campaign ahead of midterms US elections

Security Industry Association Announces RISE Scholarship Opportunity for Young Security Professionals

$30,000 IN RISE SCHOLARSHIPS AVAILABLE TO HELP IN REACHING PROFESSIONAL DEVELOPMENT AND EDUCATIONAL GOALS SILVER SPRING, Md. – Applications are now being accepted for scholarships offered through the Security Industry Association (SIA) RISE […]

Posted in Cyber Security News | Comments Off on Security Industry Association Announces RISE Scholarship Opportunity for Young Security Professionals

Trend Micro Nurtures Global Cybersecurity Talent With 2018 Capture The Flag Event

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced its fourth annual Capture The Flag (CTF) competition, which invites teams from around the world to demonstrate […]

Posted in Cyber Security News | Comments Off on Trend Micro Nurtures Global Cybersecurity Talent With 2018 Capture The Flag Event

Google bans cryptocurrency mining apps from the official Play Store

Google has updated the Play Store Developer Policy page to ban mobile mining apps that mine cryptocurrencies using the computational resources of the devices. Due to the surge in cryptocurrency […]

Posted in Cyber Security News | Comments Off on Google bans cryptocurrency mining apps from the official Play Store

10 Common File Transfer Risks and How to Avoid Them

Have you ever caught yourself saying one of the following? “We don’t have an IT department, so I FTP from my desktop.” “I don’t need special software to transfer files; […]

Posted in Cyber Security News | Comments Off on 10 Common File Transfer Risks and How to Avoid Them

Russian APT28 espionage group targets democratic Senator Claire McCaskill

The Russia-linked APT28 group targets Senator Claire McCaskill and her staff as they gear up for her 2018 re-election campaign. The Russian APT group tracked as Fancy Bear(aka APT28, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM), that […]

Posted in Cyber Security News | Comments Off on Russian APT28 espionage group targets democratic Senator Claire McCaskill

Kronos Banking Trojan resurrection, new campaigns spotted in the wild

Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the recent months. The infamous Kronos banking Trojan is back, and according […]

Posted in Cyber Security News | Comments Off on Kronos Banking Trojan resurrection, new campaigns spotted in the wild

State of the SOC: How Does Yours Stack Up?

How does your company stack up against the state of the security operations center (SOC)? In its inaugural report on the topic, next-generation SIEM provider Exabeam surveyed a range of […]

Posted in Cyber Security News | Comments Off on State of the SOC: How Does Yours Stack Up?

Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs

BlackHat is expanding its community centric programming, developed to continue its service to the wider InfoSec industry. Over the past few years, Black Hat has made strategic steps in welcoming […]

Posted in Cyber Security News | Comments Off on Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X