Monthly Archives: July 2019
LAPD data breach exposes personal info of thousands of officers
While Capital One incident is making the headlines, another incident may have severe consequences, the Los Angeles Police Department (LAPD) also suffered a data breach. The Los Angeles Police Department […]
Prolific Dark Web dealer of drugs pleads guilty
One of the most active drug sellers on the Dark Web was charged by law authorities and ordered to forfeit over $4 million in cryptocurrency. The US Department of Justice […]
Challenges and Opportunities in Securing the IoT
By Sudarshan Krishnamurthi, head of business strategy for Cisco’s education services IDC estimates the economic value of digital transformation to be $20 trillion, or more than 20 percent of the […]
Employee training: from the weakest link in a chain to your secret we apon
By Milica D. Djekic The modern cyber defense world would face up many challenges. For instance, it’s not an easy thing to cope with the phishing attacks or teach your […]
How to Train Your Staff on Cyber security
By Vera Salauyova Should every company train its employees on cybersecurity? Modern businesses depend on data and confidential information completely and this data nearly always is managed by people. So […]
End User Security Education
Why Cybersecurity Education for Employees is so important by Lawrence H King, Application Analyst, Northwestern Medical Center An organization is only as strong as the weakest link in its cybersecurity […]
Bootstamp: Useful Tool in Researching Bootloaders
By Charles Parker, II; Cybersecurity Lab Engineer Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device […]
The link between corruption and cyber defense
By Milica D. Djekic The corruption is a financial crime covering on the misuse of public authority for a private gain. It’s a sort of criminality that costs the global […]
More Ransom project has helped victims to save $108 million of ransom
Over the past three years, the website of No More Ransom was visited by 3 million users and allowed to save $108 million in ransom to the victims of 109 […]
German firms BASF, Siemens, Henkel hit by cyber attacks
A new wave of cyber attacks carried out by a China-linked APT group hit German blue-chip companies BASF, Siemens, Henkel and others. On Wednesday, German blue-chip companies BASF, Siemens, Henkel […]
A New Approach is Essential in the Battle Against Cyber threats
By Daniel Miller Cyberthreats such as malware and ransomware traverse the globe each day and are designed to get past even the most astute enterprise users. Clicking on seemingly legitimate […]
Do you know who you’re letting inside your networks?
By Michael Brengs A hacker attacks. Your company reacts. That’s the default position most companies find themselves in, despite their best intentions. Proactive security is ideal, but when most organizations […]
Connected Vehicle Apps High Risks
By Charles Parker, II; Cybersecurity Lab Engineer A new or newer car is a significant investment for most. As a rule of thumb, most people don’t have the ability to […]
Dealing with Insider Threats: How to Repair the Weakest Link in Your Network Security
By Jason Matlock The greatest threat to an organization’s security is often its own employees. Consider that insider threat resulted in 71 percent of reported cyberattacks in the healthcare industry […]
Southern Oregon University Breach: An Expensive Lesson
By Charles Parker, II; Cybersecurity Lab Engineer Attackers have been motivated by money. The focus has been the cash flow for the nefarious operation. One area that receives significant attention […]
The Noise Before Defeat: A Focus On Cybersecurity Tactics
By John Walsh, director of product marketing, SSH Communications Security While everyone is busy addressing the most recent cybersecurity threat in the news, the fundamental flaw in their company’s cybersecurity […]
Identify the “intrusion kill chain” to stop data breaches in their tracks
By François Amigorena, CEO, IS Decisions To fight a cybercriminal, you have to think like a cybercriminal. If you know how attackers work, how they think and how they act, […]
When Phishing Succeeds The Alternate Inbox Method
By Michael Landewe, Co-founder, Avanan Before you continue reading, you should check to see if your email address is one of the millions that has already been compromised: HaveIBeenPwned.com. An […]
Startups Get a Jump on Success with the LaunchPad Technology Accelerator
Program Reinvents Company-Creation Process; Offers Innovators Business Training and Technical Resources, Supports Promising Entrepreneurs By Drew Cohen, CEO & President, MasterPeace Solutions Ltd. Many startup companies begin life as an […]
Securing V2I & the Future of Intelligent Transportation Systems
By Malte Pollmann, CEO, Utimaco Automotive manufacturers are scrambling to become the defacto “name” for Internet of things (IoT) enabled vehicles, which will soon be the standard rather than a […]
Defensive Measures for Non Profits
By Charles Parker, II; Cybersecurity Lab Engineer Attackers have not been overly picky as to the selection of targets. The focus continues to be the money and data, specifically sensitive […]
Comodo Antivirus is affected by several vulnerabilities
Experts discovered several flaws in Comodo Antivirus, including a vulnerability that could allow to escape the sandbox and escalate privileges. The Tenable expert David Wells discovered five flaws in the Comodo […]
Note to HR: InfoSec Applicants are not Necessarily Mainstream
Ode to the InfoSec Personnel Paradigm Shift By DRP Cybersecurity Lab Engineer They say the only constant changes. This is exceptionally applicable to the IT area and personnel at this […]
Common Sense Passwords
Disclaimer: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure you have the proper authorization for any security exercises in […]
Adapting Security Policies to Fit the Cloud Computing Era
By Roger Hale The Cloud Computing Era has been shaking things up since it began. And unlike Moore’s law, the pace has been fast and furious and more importantly, unpredictable. […]
CERT-Bund warns of a critical flaw in VLC player
VLC player is still affected by a critical heap-based memory buffer over-read condition, tracked as CVE-2019-13615, that could be exploited by a remote attacker to execute arbitrary code. The VLC […]
New APT34 campaign uses LinkedIn to deliver fresh malware
The APT24 group continues its cyber espionage activity, its members were posing as a researcher from Cambridge to infect victims with three new malware. Experts at FireEye have uncovered a […]
The role of legal regulations in effective proceeding of a financial crime
By Milica D. Djekic Financial crime is any sort of economic resources misusing in order to obtain private gain. It may include corruption and bribery, fraud, tax envision, money laundering […]
A flaw in discontinued Iomega/Lenovo NAS devices exposed millions of files
Experts at Vertical Structure and WhiteHat Security discovered a serious flaw that exposed millions of files stored on thousands of exposed Lenovo NAS devices. An analysis conducted by researchers at […]
Expert was awarded $10,000 for disclosing XSS flaw to Tesla
Tesla paid $10,000 a researcher that found a stored cross-site scripting (XSS) vulnerability that could have been exploited to change vehicle information. The security researcher Sam Curry has earned $10,000 […]