Monthly Archives: January 2020
A vulnerability in Zoom platform allowed miscreants to join Zoom meetings
A vulnerability in the Zoom online meeting system could be exploited to join meetings and view all content shared by participants. The popular video conferencing Zoom is affected by a […]
Blocking Privilege Escalation Attacks in Amazon Web Services (AWS)
Blocking Privilege Escalation Attacks in Amazon Web Services (AWS) By Gerben Kleijn Security researcher Spencer Gietzen discovered and shared 21 privilege escalation attacks across Amazon Web Services (AWS) back in […]
For the second time in a few days, Greek Government websites hit by DDoS attacks
The Greek government announced that a DDoS cyber attack hit the official state websites of the prime minister, the national police and fire service and several important ministries. Yesterday the […]
Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack
Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric. According to ZDNet, the hackers involved in the attack against the Mitsubishi […]
Jeff Bezos phone was hacked by Saudi crown prince
The phone of the Amazon billionaire Jeff Bezos was hacked in 2018 after receiving a WhatsApp message from the personal account of the crown prince of Saudi Arabia. In April […]
OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda
US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. In 2016, the US Cyber […]
Mitsubishi Electric discloses data breach, media blame China-linked APT
Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate information. Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. […]
Hack the Army bug bounty program paid $275,000 in rewards
Hack the Army bug bounty program results: 146 valid vulnerabilities were reported by white hat hackers and more than $275,000 were paid in rewards. The second Hack the Army bug […]
How To Drive the AI Value Proposition in Insurance with Cutting-Edge Analytics and Innovation
The insurance industry is facing the challenges of disruption caused by the technological advancements in artificial intelligence (AI) and machine learning (ML). Insurance carriers are now able to know more […]
P&N Bank data breach may have impacted 100,000 West Australians
P&N Bank discloses data breach, customer account information, balances exposed The Australian P&N Bank is notifying its customers a data breach that has exposed personally identifiable information (PII) and sensitive […]
McAfee is Cutting Through the Jargon, and Empowering Consumers
Las Vegas, NV – The days of the paternalistic approach to cybersecurity may be numbered. Until recently, the data security and privacy ecosystem have been driven by the assumption that […]
Moving Network Security to The Cloud
What Is Secure Access Service Edge (Sase) And Why It Matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
The Decade Ahead for Cybersecurity
By Matthew Gyde, CEO, Security, NTT Ltd. The Dawn of a New Era As 2020 dawns, we stand at the threshold of a new decade that’s certain to reveal challenges […]
US Military Veterans Targeted By Online Scams
After Years of Vigilant Service, US Veterans must remain Vigilant Online and Guard their Home like US Marines Guard the President of the United States (POTUS) US Veterans are twice […]
More Spending Won’t Solve Your Hardest IT Challenges In 2020 And Beyond. Here’s What Will.
By Chris Hallenbeck, CISO of the Americas at Tanium U.S. state and local governments have been observing the proposed State and Local Cybersecurity Government Act of 2019, especially since it […]
Anomaly Detection Is the Next Cybersecurity Paradigm
It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart […]
Fraud: A Look Back At 2019 And What to Expect in The New Year
By Christina Luttrell, IDology The approach of the new year is a good time to reflect on the fraud landscape and its impact on businesses and consumers. Fraudsters continue to push […]
How To Build A Career In Cyber Security
By Pedro Tavares Nowadays, cybersecurity is seen as an attractive landscape for ambitious people and a truly great opportunity to fight cybercrime. During the past few months, many cyberattacks have […]
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions […]
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view […]
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age […]
Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over […]
Encryption Is Key to Guarantee Data Is Anonymous
By Julian Weinberger, CISSP, Director of Systems Engineering at NCP engineering Regulatory initiatives such as the EU General Data Protection Regulation (GDPR) have granted consumers powerful rights to determine how organizations […]
The Ultimate Guide to SSL/TLS Decryption
Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. […]
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
TikTok security flaws allowed hijacking any account
A flaw in the popular TikTok app could allow attackers to hijack any user account just by knowing the mobile number of the victim. Security experts from CheckPoint have discovered […]
What’s the Security Misconfiguration Antidote? Automation.
By Joshua Williams, Senior Cloud and Automations Solutions Engineer, FireMon The collective security community is spending too time much worrying about vulnerabilities. They need to shift some of those resources […]
China-based Bronze President APT targets South and East Asia
A cyber-espionage group tracked as Bronze President has been targeting countries in South and East Asia, Secureworks experts warn. Researchers at Secureworks’ Counter Threat Unit (CTU) have uncovered a cyber […]