Monthly Archives: July 2019

LAPD data breach exposes personal info of thousands of officers

While Capital One incident is making the headlines, another incident may have severe consequences, the Los Angeles Police Department (LAPD) also suffered a data breach. The Los Angeles Police Department […]

Posted in Cyber Security News | Comments Off on LAPD data breach exposes personal info of thousands of officers

Prolific Dark Web dealer of drugs pleads guilty

One of the most active drug sellers on the Dark Web was charged by law authorities and ordered to forfeit over $4 million in cryptocurrency.  The US Department of Justice […]

Posted in Cyber Security News | Comments Off on Prolific Dark Web dealer of drugs pleads guilty

Challenges and Opportunities in Securing the IoT

By Sudarshan Krishnamurthi, head of business strategy for Cisco’s education services IDC estimates the economic value of digital transformation to be $20 trillion, or more than 20 percent of the […]

Posted in Cyber Security News | Comments Off on Challenges and Opportunities in Securing the IoT

Employee training: from the weakest link in a chain to your secret we apon

By Milica D. Djekic The modern cyber defense world would face up many challenges. For instance, it’s not an easy thing to cope with the phishing attacks or teach your […]

Posted in Cyber Security News | Comments Off on Employee training: from the weakest link in a chain to your secret we apon

How to Train Your Staff on Cyber security

By Vera Salauyova Should every company train its employees on cybersecurity? Modern businesses depend on data and confidential information completely and this data nearly always is managed by people. So […]

Posted in Cyber Security News | Comments Off on How to Train Your Staff on Cyber security

End User Security Education

Why Cybersecurity Education for Employees is so important by Lawrence H King, Application Analyst, Northwestern Medical Center An organization is only as strong as the weakest link in its cybersecurity […]

Posted in Cyber Security News | Comments Off on End User Security Education

Bootstamp: Useful Tool in Researching Bootloaders

By Charles Parker, II; Cybersecurity Lab Engineer Bootloaders have a very specific function as they load the OS kernel. The bootloader starts the chain of trust (CoT) as the device […]

Posted in Cyber Security News | Comments Off on Bootstamp: Useful Tool in Researching Bootloaders

The link between corruption and cyber defense

By Milica D. Djekic The corruption is a financial crime covering on the misuse of public authority for a private gain. It’s a sort of criminality that costs the global […]

Posted in Cyber Security News | Comments Off on The link between corruption and cyber defense

More Ransom project has helped victims to save $108 million of ransom

Over the past three years, the website of No More Ransom was visited by 3 million users and allowed to save $108 million in ransom to the victims of 109 […]

Posted in Cyber Security News | Comments Off on More Ransom project has helped victims to save $108 million of ransom

German firms BASF, Siemens, Henkel hit by cyber attacks

A new wave of cyber attacks carried out by a China-linked APT group hit German blue-chip companies BASF, Siemens, Henkel and others. On Wednesday, German blue-chip companies BASF, Siemens, Henkel […]

Posted in Cyber Security News | Comments Off on German firms BASF, Siemens, Henkel hit by cyber attacks

A New Approach is Essential in the Battle Against Cyber threats

By Daniel Miller Cyberthreats such as malware and ransomware traverse the globe each day and are designed to get past even the most astute enterprise users. Clicking on seemingly legitimate […]

Posted in Cyber Security News | Comments Off on A New Approach is Essential in the Battle Against Cyber threats

Do you know who you’re letting inside your networks?

By Michael Brengs A hacker attacks. Your company reacts. That’s the default position most companies find themselves in, despite their best intentions. Proactive security is ideal, but when most organizations […]

Posted in Cyber Security News | Comments Off on Do you know who you’re letting inside your networks?

Connected Vehicle Apps High Risks

By Charles Parker, II; Cybersecurity Lab Engineer A new or newer car is a significant investment for most. As a rule of thumb, most people don’t have the ability to […]

Posted in Cyber Security News | Comments Off on Connected Vehicle Apps High Risks

Dealing with Insider Threats: How to Repair the Weakest Link in Your Network Security

By Jason Matlock The greatest threat to an organization’s security is often its own employees. Consider that insider threat resulted in 71 percent of reported cyberattacks in the healthcare industry […]

Posted in Cyber Security News | Comments Off on Dealing with Insider Threats: How to Repair the Weakest Link in Your Network Security

Southern Oregon University Breach: An Expensive Lesson

By Charles Parker, II; Cybersecurity Lab Engineer Attackers have been motivated by money. The focus has been the cash flow for the nefarious operation. One area that receives significant attention […]

Posted in Cyber Security News | Comments Off on Southern Oregon University Breach: An Expensive Lesson

The Noise Before Defeat: A Focus On Cybersecurity Tactics

By John Walsh, director of product marketing, SSH Communications Security While everyone is busy addressing the most recent cybersecurity threat in the news, the fundamental flaw in their company’s cybersecurity […]

Posted in Cyber Security News | Comments Off on The Noise Before Defeat: A Focus On Cybersecurity Tactics

Identify the “intrusion kill chain” to stop data breaches in their tracks

By François Amigorena, CEO, IS Decisions To fight a cybercriminal, you have to think like a cybercriminal. If you know how attackers work, how they think and how they act, […]

Posted in Cyber Security News | Comments Off on Identify the “intrusion kill chain” to stop data breaches in their tracks

When Phishing Succeeds The Alternate Inbox Method

By Michael Landewe, Co-founder, Avanan Before you continue reading, you should check to see if your email address is one of the millions that has already been compromised: HaveIBeenPwned.com. An […]

Posted in Cyber Security News | Comments Off on When Phishing Succeeds The Alternate Inbox Method

Startups Get a Jump on Success with the LaunchPad Technology Accelerator

Program Reinvents Company-Creation Process; Offers Innovators Business Training and Technical Resources, Supports Promising Entrepreneurs By Drew Cohen, CEO & President, MasterPeace Solutions Ltd. Many startup companies begin life as an […]

Posted in Cyber Security News | Comments Off on Startups Get a Jump on Success with the LaunchPad Technology Accelerator

Securing V2I & the Future of Intelligent Transportation Systems

By Malte Pollmann, CEO, Utimaco Automotive manufacturers are scrambling to become the defacto “name” for Internet of things (IoT) enabled vehicles, which will soon be the standard rather than a […]

Posted in Cyber Security News | Comments Off on Securing V2I & the Future of Intelligent Transportation Systems

Defensive Measures for Non Profits

By Charles Parker, II; Cybersecurity Lab Engineer Attackers have not been overly picky as to the selection of targets. The focus continues to be the money and data, specifically sensitive […]

Posted in Cyber Security News | Comments Off on Defensive Measures for Non Profits

Comodo Antivirus is affected by several vulnerabilities

Experts discovered several flaws in Comodo Antivirus, including a vulnerability that could allow to escape the sandbox and escalate privileges. The Tenable expert David Wells discovered five flaws in the Comodo […]

Posted in Cyber Security News | Comments Off on Comodo Antivirus is affected by several vulnerabilities

Note to HR: InfoSec Applicants are not Necessarily Mainstream

Ode to the InfoSec Personnel Paradigm Shift By DRP Cybersecurity Lab Engineer They say the only constant changes. This is exceptionally applicable to the IT area and personnel at this […]

Posted in Cyber Security News | Comments Off on Note to HR: InfoSec Applicants are not Necessarily Mainstream

Common Sense Passwords

Disclaimer: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure you have the proper authorization for any security exercises in […]

Posted in Cyber Security News | Comments Off on Common Sense Passwords

Adapting Security Policies to Fit the Cloud Computing Era

By Roger Hale The Cloud Computing Era has been shaking things up since it began. And unlike Moore’s law, the pace has been fast and furious and more importantly, unpredictable. […]

Posted in Cyber Security News | Comments Off on Adapting Security Policies to Fit the Cloud Computing Era

CERT-Bund warns of a critical flaw in VLC player

VLC player is still affected by a critical heap-based memory buffer over-read condition, tracked as CVE-2019-13615, that could be exploited by a remote attacker to execute arbitrary code. The VLC […]

Posted in Cyber Security News | Comments Off on CERT-Bund warns of a critical flaw in VLC player

New APT34 campaign uses LinkedIn to deliver fresh malware

The APT24 group continues its cyber espionage activity, its members were posing as a researcher from Cambridge to infect victims with three new malware. Experts at FireEye have uncovered a […]

Posted in Cyber Security News | Comments Off on New APT34 campaign uses LinkedIn to deliver fresh malware

The role of legal regulations in effective proceeding of a financial crime

By Milica D. Djekic Financial crime is any sort of economic resources misusing in order to obtain private gain. It may include corruption and bribery, fraud, tax envision, money laundering […]

Posted in Cyber Security News | Comments Off on The role of legal regulations in effective proceeding of a financial crime

A flaw in discontinued Iomega/Lenovo NAS devices exposed millions of files

Experts at Vertical Structure and WhiteHat Security discovered a serious flaw that exposed millions of files stored on thousands of exposed Lenovo NAS devices. An analysis conducted by researchers at […]

Posted in Cyber Security News | Comments Off on A flaw in discontinued Iomega/Lenovo NAS devices exposed millions of files

Expert was awarded $10,000 for disclosing XSS flaw to Tesla

Tesla paid $10,000 a researcher that found a stored cross-site scripting (XSS) vulnerability that could have been exploited to change vehicle information. The security researcher Sam Curry has earned $10,000 […]

Posted in Cyber Security News | Comments Off on Expert was awarded $10,000 for disclosing XSS flaw to Tesla

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X