Personal Safety

IT Security News Daily Summary 2018-08-10

IT Security News Daily Summary 2018-08-10

Enhance security and simplify network integration with Extension Host on Azure Stack
5 Examples of How Cheating in Fortnite Gets You Infected
US Braces for Possible Cyberattacks After Iran Sanctions
Researcher Finds Hundreds of Planes Exposed to Remote Attacks
Medical devices still hackable, researchers say
Emma’s Diary / Labour Data Sale Fine – CA Technologies
AI Programs Look Set To Take Hacking To A New Level
DMARC deadline looms for federal agencies
2018 Pwnie Awards cast light and shade on infosec winners
The Phishing Response Playbook
The Top 3 Open Source Tools for AWS Incident Response
Threat Roundup for August 3-10
Public safety tech accelerator debuts
Some VPN providers leak your IPv6 IP address
Web cache poisoning attacks demonstrated on major websites, platforms
Shining a Light on a New Way to Attack WPA2 Weaknesses
Hackers Tee Up a Ransomware Attack for the PGA Ahead of the 2018 Championship
Anti-Phishing Training vs. Software: Does Security Awareness Training Work?
Windows 10 Insider Build 17735 Released With Bug Fixes
Threat Hunting for Mismatched Port – Application Traffic
WhatsApp vulnerabilities let hackers alter messages
IDG Contributor Network: Machine learning: It’s all about the use cases [baby]!
New Security Awareness Practitioner Certification
Crestron Touchscreens Could Spy on Hotel Rooms and Meetings
A closer look at DOD’s cloudy JEDI contract
Webcast Offers Guidance on Adopting the DevOps Model Without Sacrificing Security
Millions of Android Devices Are Vulnerable Out of the Box
The 6 Latest Phishing Emails to Avoid in 2018
DNS Leak Fixed in Kaspersky VPN App for Android
xkcd on Voting Computers
BIOS Boots What? Finding Evil in Boot Code at Scale!
Accenture Report On Escalating Supply Chain Cyber Attacks
Samsung Shares New ‘Ingenius’ Ads Pitting New Galaxy Note 9 Against iPhone X
DevOps: How to Securely Spin Up Containers using CMS, Puppet, and Ansible
Machine Learning Can Identify the Authors of Anonymous Code
DHS, FBI again point to North Korea malware
ProBeat: Android adoption needs a bigger slice of Pie
Channel Scoop: August 10, 2018
The analysis of the code reuse revealed many links between North Korea malware
Flying drones near wildfires could kill people: Don’t do it
How to protect your RDP access from ransomware attacks
Facebook Says It Bans Content That “Financially Endangers” Users
Why Is Data Security Important for Everyone?
Spec-Exec CPU Bugs Sweep Hacking Oscars
Understanding the Balance: Key Insights Shaping Technology Transformation in the Cloud and Hosting Markets
BankBot Anubis Still a Threat, Gets Upgrade
Concern Over IoT Security Grew for Most BHUSA Attendees in Past Year, Reveals Survey
.KEYPASS Files Virus – How to Remove and Restore Data
Butlin’s Says Guest Records May Have Been Hacked
This Week in Security News: Hijacks and Healthcare
Hack Causes Pacemaker To Deliver Life Threatening Shocks
AWS Error Exposed GoDaddy Biz Secrets
Caesars Palace Ejected Matt Linton Over A Lousy Tweet
Remove Zoldon Virus — Remove Active Infections and Restore Data
Mozilla Firefox 61.0.2 Released With New Automatic Restore Feature for Windows
RiskRecon secures $25 million in Series B funding
Ixia now offers packet-level visibility into workloads in containers and Kubernetes clusters
Ericsson is increasing 5G and AI investments to speed U.S. rollouts
Hackers phish Butlin’s holiday camp chain, access customers’ personal data
How some business Macs could get hacked right out of the box
Digital Guardian releases new User and Entity Behaviour Analytics capability
Deep Instinct introduces new analytical capabilities for cyberattack insights and visibility
BAE Systems to develop automated cyber defense tools for DARPA
SentinelOne partners with SecBI to provide threat visibility, containment and remediation
Kryptowire introduces the mobile phone firmware vulnerability feed
Vulnerabilities in mPOS devices could lead to fraud and theft
An Inside Look at How The Asian Dark Internet Impacts Threat Hunters and CyberSecurity Teams
Macs in Enterprise Can Be Hacked on First Boot
Hosted Identity Cloud
Alejandro Hernandez’s Exposing Security Weakness in Stock Trading Tech
PMP Certification: Boost Your Career and Earn More Money (CyberSpeak Podcast)
Microsoft’s new framework could help policymakers better understand cybersecurity
Black Hat 2018: Voice Authentication is Broken, Researchers Say
Hi-de-Hack! Redcoats red-faced as Butlin’s holiday camp admits data breach hit 34,000
Social Mapper Uses Facial Recognition to Track Users on Social Media
Dragos to integrate ICS-specific threat intelligence with cyber intelligence partners
Despite patches, Samsung Galaxy S7 open to Meltdown exploit and millions are affected
DOD sharply restricts use of geolocation devices and services
InfoSec Institute launches Security Awareness Practitioner Certification
Risk of Fraud in Mobile Point-of-Sale Device Flaw
The Enigma of AI & Cybersecurity
Cyber Security Roundup for July 2018
Best Practices for the Protection of Information Assets, Part 3
How did the TimeHop data breach happen?
Forrester Wave WAF Guide 2018 : Top 10 Vendors That Matter & How They Stack Up
Congresscritters want answers on Tillerson’s rm -rf /opt/gov/infosec
Lack of Hardened Benchmarks Leads to Poor Cyber Hygiene
How to Add a Phishing Notification Button to Outlook
Latest on the Currys PC World Data Breach Impacting 10 Million Customers
6 Eye-Raising Third-Party Breaches
PowerGhost Cryptocurrency Mining Malware Targets Corporate Networks
UK government worried Huawei software could facilitate cyberespionage
The Trends in Spear Phishing Attacks
Remove CMB Dharma Virus — Remove and Restore .cmb Files
3 Steps to Deal With the Aftermath of the Highjacked Eslint-Scope Package
Identity Is the New Perimeter — But Where’s Its Firewall?
Threat Hunting for Unexpectedly Patched Systems
Comcast Xfinity web flaws exposed customer data
Remove Search Feed Tech PUP and Stop Ads
New Google software, new smartphone flaws, and the high cost of ransomware | Avast
Gaps and Up-Hill Battles
Hunting SSL/TLS clients using JA3, (Fri, Aug 10th)
PayPal, Square vulnerabilities impact mobile point-of-sale machines
How one man could have hacked every Mac developer (73% of them, anyway)
Facebook user data: How do malicious apps steal user data?
Talking phishing campaigns with @PhishingAI’s Jeremy Richards | Salted Hash, Ep. 42
Top 10 Anti-Phishing Email Templates
Tech ONTAP Podcast Episode 151: Honeycomb.io, Serverless and DevOps
An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41
Growth of IBM/Maersk platform proves blockchain is upending global trade
Tech Docs: Five New Features in the Traps Management Service
Back-to-School Cyber Safety
The 10 Best Practices for Identifying and Mitigating Phishing
Professional Golfers’ Association hit by ransomware days before championship
Asian Dark Web Communities Thrive on Cultural Differences
15,000-strong army of Twitter robots found spreading cryptocurrency spam
Internet security, encrypted messaging and privacy projects win Facebook grants
Know Your Enemy: How to Build a Successful Threat Hunting Program
Don’t Fear the TSA Cutting Airport Security. Be Glad That They’re Talking about It.
5 ways machine learning makes life harder for cybersecurity pros
Don’t Fear the TSA Cutting Airport Security. Be Glad That They’re Talking about It.
Legal Sites to Practice Hacking Skills
Off-colour tweet earns Google’s Spectre whizz a midnight eviction from Caesars and DEF CON
Social Mapper: A free tool for automated discovery of targets’ social media accounts
Flaws in ATM Dispenser Controllers Allowed Hackers to Steal Cash
AWS error exposed GoDaddy business secrets
Satellite Flaws Raise Aviation Fears
Cyber News Rundown: WannaCry Shuts Down Taiwanese Chipmaker
Vuln: VMware vCenter Server CVE-2015-1047 Denial of Service Vulnerability
Vuln: OpenSLP ‘SLPDProcessMessage()’ Function Double Free Denial of Service Vulnerability
Facebook ‘regrets’ balloons and confetti triggered by earthquake posts
Black Hat 2018: With Healthcare Security Flaws, Safety’s Increasingly at Stake
Vuln: VMware vCenter Server CVE-2015-2342 Remote Code Execution Vulnerability
Vuln: Adobe Flash Player CVE-2018-4878 Use After Free Remote Code Execution Vulnerability
New WhatsApp flaws let attackers hack chats to spread fake news
CSO Spotlight: Nick Belov, CGS
Salted Hash Ep 42: Phishing AI
Cops Claim Victory After Busting $1m Phone Fraud Ring
Former Tesla Lead Engineer Doug Field Returns to Apple to Work on Project Titan
Smart Cities at Risk from ‘Panic Attacks’
Enhancing AWS Secrets Manager With Summon
Iron Rain: What Defines a Cyber Insurgency?
IoT malware found hitting airplanes’ SATCOM systems
Ransomware-as-a-Service – Princess Evolution Ransomware Advertised in Underground Forums
The Need for Effective Third-Party Risk Management in Financial Services
Fake Accounts Targeting US Political Groups Ousted by LinkedIn
Protecting Data in the Era of IoT
It’s 2018 and I can still hack into sat-comms gear, sighs infosec dude
Phantom menace: mobile banking Trojan modifications reach all-time high
DanaBot Malware Spear Phishes Enterprise Players Through FTP Links
AWS does a guff in a bucket and exposes GoDaddy’s dirty laundry
Encryption doesn’t stop him or her or you… from working out what Thing 1 is up to
Under half of firms use vulnerability assessments
Crims hacked accounts, got phones, resold them – and the Feds reckon they’ve nabbed ’em
This Guy Hacked Hundreds Of Planes From The Ground
Pulkovo Airport’s air-traffic control system malfunctioned after receiving threatening emails from Hackers
Spec-exec CPU bugs sweep hacking Oscars – and John McAfee’s in there like a bullet
Social Mapper – Correlate social media profiles with facial recognition
ICO Fines Emma’s Diary £140,000 Over Campaign Data
Crowdfense launches platform to source new zero-day vulnerabilities for sale
Can we talk about the little backdoors in data center servers, please?
Juniper Networks Rises to 5G Networks Security Challenge
Security expert discovered a bug that affects million Kaspersky VPN users
Enterprises as modern software factories: Infusing security throughout the app dev process
Say what you will about self-driving cars – the security is looking ‘OK’
Microsoft OneDrive: The Good, the Bad, and the Ugly
DarkHydrus – Malicious Hackers Group using Open-source Phishing Tool to Steal Credentials
Free DevSecOps Solution — Take Control of Software Security
August Patch Tuesday forecast: Looking ahead after a frustrating July
Say what you will about self-driving cars – the security is looking OK
Latest Hacking News Podcast #96
Australian government takes Govpass hosting internal
New Bug Lets Hackers Compromise Macs During The Setup Process
Xori Adds Speed, Breadth to Disassembler Lineup
Traceability
Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits
FBI Uncovered North Korean Malware Attack KEYMARBLE on U.S Government Entities to Stealing Sensitive Data
Opt-out period for My Health Record officially extended until November 15
Denon and Marantz AV Receivers Updated With AirPlay 2 Support
Alcide Competes in 2018 ‘ASTORS’ Homeland Security Awards
IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships
ISC Stormcast For Friday, August 10th 2018 https://isc.sans.edu/podcastdetail.html&# x 3f;id=6118, (Fri, Aug 10th)
You can’t always trust those mobile payment gadgets as far as you can throw them – bugs found by infosec duo
Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft
The Supply Chain is Only as Strong as its Weakest Link: How You Can Better Defend Against Third-Party Cyberattacks
EFF Tells Bay Area Regional Transit: Reject Proposed Face Surveillance Scheme
Cramer Remix: Trade sanctions are hurting hedge funds the most
‘You don’t have to be an expert anymore to run ransomware,’ Cyberark CEO warns
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Kaspersky VPN blabbed domain names of visited websites – and gave me a $0 reward, says chap
AWS Employee Flub Exposes S3 Bucket Containing GoDaddy Server Configuration and Pricing Models
Criptext Announces New Email Client With Focus on Your Privacy
5 Tips To Protect Your IoT Devices
Bugs in Mobile Credit Card Readers Could Expose Buyers
Topple Track Attacks EFF and Others With Outrageous DMCA Notices
“Quiet Skies” – A TSA Surveillance Program Targets Ordinary U.S. Citizens
Scam Phone Message In Chinese Hits US Weather Service Intercom System
PGA Championship Hit By Targeted Ransomware Attack
Achieving ISO/IEC 27001 Certification with JumpCloud
Understanding TRITON and the Missing Final Stage of the Attack
Irregularities discovered in WinVote voting machines
Can electricity use predict a bad morning commute?
Weekly Update 99
# BHUSA The Value of Skills, Education and Experience in Information Security Hiring
IT Security News Daily Summary 2018-08-09
# BHUSA Focus on Hiring and Retaining Female Security Employees
Access management: What agencies need to know
Crims hacked accounts, got phones, resold them – and the Feds reckon they’ve nabbed ’em
MyFHA – 972,629 breached accounts
IDG Contributor Network: Here I am, hack me
DIUx gets rebranded
Hands-On With Samsung’s New Galaxy Note 9 and Galaxy Watch
Helping smart cities tap into federal funding
Protecting the protector: Hardening machine learning defenses against adversarial attacks
Frictionless access to city, county services
DOD releases 4-part plan for Space Force
Apple Picks Up New Video Game Comedy From Charlie Day and Rob McElhenney
NIST pushes on next version of Risk Management Framework
Researchers Say Code Reuse Links North Korea’s Malware
LibreOffice 6.1 Released With Icons That Make it More Windows-Like
Osiris dropper found using process doppelgänging
The Importance of SSL Certificates for Small Business Websites
EFF Amicus Brief: The Privacy Act Requires the FBI to Delete Files of Its Internet Speech Surveillance
Apple Pay Gains Momentum With Estimated 250 Million Users, 200% Transaction Growth Predicted Next Year
Popular encryption software: Researchers help close security hole
Linux kernel network TCP bug fixed
DISA’s New Chief of Staff Focused on Serving the Warfighter
Complimentary Gartner Report: Peer Insights ‘Voice of the Customer’ – Security Awareness CBT
Risk & Repeat: Can Disclose.io help protect vulnerability researchers?
GoDaddy Exposes System Map and Business Strategy Info on AWS
Be Ready for Cloud, 5G and IoT with Advanced Security Acceleration
Tufin & Fortinet: Policy-Based Change Automation Across the Security Fabric
Black Hat 2018: Xerox CISO on why the tech industry needs to simplify
Weakness in WhatsApp Enables Large-Scale Social Engineering
You don’t need to be a hacker to get a high-paying cybersecurity job
NEWS: Newly Discovered WhatsApp Exploit Lets Hackers Access Group Chats To Spread Fake Messages
Black Hat 2018: Akamai exec discusses IoT vulnerabilities, SQL injections, phishing, and more
DHS & Facebook Combat Threats to US Elections (Learn More, See Video)
Defending your business from a SamSam ransomware attack
FirstNet Plans Emerg Drop Kits, As a ‘Connected Bubble’ for Public Safety
PGA of America Struck By Ransomware
Florida’s Democratic senator claims Russia has breached his state’s election systems
How To Fry An Egg On a Cryptojacked Router
ShowMeCon 2018, Paul Coggin’s ‘SS7 for INFOSEC’
Black Hat 2018: Sneaker bots and the challenges they present
Hacking a Brand New Mac Remotely, Right Out of the Box
Oh, fore putt’s sake: Golf org PGA bunkered up by ransomware attack just days before tournament
West Virginia Goes Mobile, Georgians Sue for Paper Vote
Meltdown and Spectre disclosure suffered “extraordinary miscommunication”
Identifying HIPPA, PCI, SOX Data for Masking
New WhatsApp flaws let attackers hack private/group chats to fake news
Smartphone Voting Is Happening, but No One Knows if It’s Safe
Mixed-Use Zoning in Malicious Infrastructure
Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card
Black Hat 2018: Widespread Critical Flaws Found in Smart-City Gear
Black Hat 2018: Stealthy Kernel Attack Flies Under Windows Mitigation Radar
DeepLocker – AI-powered malware are already among us
Discover which dangers lurk ahead – at Sophos’ ‘See the Future’ event
North Korean Malicious Cyber Activity
Building on experience: a framework for cybersecurity policy
Windows 10 to get disposable sandboxes for dodgy apps
Navigating the Threat from Within: Insider Threats in the Finance Industry
Securely launch your IoT-related services, devices, platforms, apps
Smartphone Voting Is Happening, But No One Knows If It’s Safe
A New Guide to Implementing a Successful DLP Program
WhiteSource unveils free open source Vulnerability Checker
Hacker Gets a Hole in One with PGA Servers
Samsung Debuts New Galaxy Note 9, Galaxy Watch, Wireless Charger Duo, and Galaxy Home Smart Speaker
Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security
All BBC websites blocked in China
AR18-221A: MAR-10135536-17 – North Korean Trojan: KEYMARBLE
The future of OT security in critical infrastructure
Complementary Gartner Report: Peer Insights ‘Voice of the Customer’ – Security Awareness CBT
A New Pacemaker Hack Puts Malware Directly On the Device
Protecting Kubernetes environments with Stealthwatch Cloud
Trump Wants a Bigger, Better Deal with Iran. What Does Tehran Want?
Project Zero director exhorts Black Hat audience to do security better
Can SNMP (Still) Be Used to Detect DDoS Attacks?
Large ISPs, Flushed with Capital, Blame Consumer Protections for Their Disregard of Rural America
New Actor DarkHydrus Targets Middle East with Open-Source Phishing
eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises
What Are the Seven Biggest Social Media Scams of 2018?
8 everyday technologies that can make you vulnerable to cyberattacks
A First-Hand Experience with CISSP CAT
Quis Custodiet Ipsos Custodes
Dark Reading News Desk Live at Black Hat USA 2018
Malicious Botnet Traffic Targets Retail Credentials
Black Hat 2018: Cortana Flaw Allowed Takeover of Locked Windows 10 Device
Irrigation system vulnerabilities highlight physical consequences of cyberattacks
Black Hat 2018: Google Bug Hunter Urges Apple to Change its iOS Security Culture
Netflix launches tool for monitoring AWS credentials
Proofpoint launches TAP Isolation, threat detection, and Threat Response python scripting
Apple Became World’s Most Valuable Company Seven Years Ago Today, Two Weeks Before Steve Jobs Resigned as CEO
Internal Facebook Memo Reveals “Psychological Trick” To Target Teens
Captive Audience: How Florida’s Prisons and DRM Made $11.3M Worth of Prisoners’ Music Disappear
WhatsApp Security Snafu Could Allow Message Manipulation
Apple Details Improvements to Siri’s Ability to Recognize Names of Local Businesses and Destinations
Researchers Find Flaws in WPA2’s 4-way Handshake Implementations
Attackers grab hold of PGA of America files, demand ransom
Discover the lurking dangers ahead at Sophos ‘See the Future’ event
How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 4
Researchers Developed Artificial Intelligence-Powered Stealthy Malware
Linux Vulnerability Could Lead To DDoS Attacks
Smart City Systems Are Riddled With Critical Security Vulnerabilities
WhatsApp could be a bad choice for your encrypted business messages
Cortana Flaw Allowed Takeover of Locked Windows 10 Device
Comcast Customer Portal Vulnerabilities Exposed Sensitive Data
Egregious Egress
What is phishing? How this cyber attack works and how to prevent it
Google to warn companies targeted in government-backed attacks
Oh, No, Not Another Security Product
Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-29)
State of Security for Open Source Web Applications 2018
Bab-El-Mandeb: Threat of attack remains despite Saudi Arabia resuming oil shipments
CVE-2018-5740 BIND Vulnerability Could Cause DoS Attacks
Fighting the Skills Gap Via Industry Leading Research and Inspiring Events
eSentire and Secure Infrastructure Provider Cyxtera Partner to Bring Zero-Trust Network Protection to Midsize Enterprises
Ransomware as a Service Princess Evolution Looking for Affiliates
NARA is doing great at email, website security. Maybe
Flaws in Siemens Tool Put ICS Environments at Risk
Apple Defends Privacy Practices To US Lawmakers
Leaked GitHub API Token Exposed Homebrew Software Repositories
A First Look at the North Korean Malware Family Tree
A White Paper About Security White Papers That Looks Like a Security Article
North Korea’s hackers are re-using old code to build new attacks
Top Five SecurityIQ Phishing Templates: July 2018 Edition
Best Practices for User Access Management
Are agencies really ready for EIS?
“Attack” on FCC over net neutrality was legitimate traffic, report says
A Guided Tour of the Asian Dark Web
Sumo Logic Expands Certification Program to Empower Users to Better Secure Modern Applications and Cloud Infrastructures
Free Facial Recognition Tool Can Track People Across Social Media Sites
How SELinux helps mitigate risk while facilitating compliance
Photo gallery: Black Hat USA 2018, part 2
New Open Source Tool Developed to Detect Twitter Botnets
Smart cities are exposed to old-school threats
Google Bug Hunter Urges Apple to Change its iOS Security Culture
What Now? How to Execute the Cybersecurity Plan You Have in Place
McAfee and Intezer find links among North Korea’s malware families
How criticality analysis benefits from an entropy engineer
BIND DNS software includes a security feature that could be abused to cause DoS condition
Bokbot: The (re)birth of a banker
DARPA takes aim at deepfake forgeries
Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families
UPnP vulnerability: How is the UPnP protocol being misused?
India rejects Apple letter on anti-spam app, suggests lawsuit
Fortnite for Android goes “off market” – is that good or bad? [VIDEO]
Detecting Phishing Sites with Machine Learning
Chinese Cyber-Criminals Take Chances on the Surface Web
Ransomware Strikes Computer Servers of Golfers’ Association
New G Suite Alerts Provide Visibility Into Suspicious User Activity
Which SD-WAN product should enterprises choose?
Four Ways to Mitigate Cyber Risks for ERP Applications
Flaws in Smart City Systems Can Allow Hackers to Cause Panic
26.5 million Comcast Xfinity customers had their partial home addresses and SSNs exposed
VB announces Threat Intelligence Summit to take place during VB2018
Numerous Apps Caught up in Apple’s New App Store Review Policy to Ban Gambling-Related Apps
Cyber Incident Risk: From IT Headache to Business Threat
Challenge accepted: 15-year-old plays Doom on ‘unhackable’ Bitfi
What is malware? Viruses, worms, trojans, and beyond
How evil JavaScript helps attackers tag possible victims – and gives away their intent
The Sensors That Power Smart Cities Are a Hacker’s Dream
Augur Cryptocurrency Bug Made The App Vulnerable To Fake Data
Bug bounties offer legal safe harbor. Right? Right?
Moving blog to HolisticInfoSec.io
Vuln: Multiple Medtronic Isulin Pumps Authentication Bypass and Information Disclosure Vulnerabilities
Smart city systems are riddled with critical security vulnerabilities
How to Outsmart the Smart City
Back to Basics: Retro Cybersecurity Lessons Still Matter
WhatsApp Vulnerability Allows Hackers to Manipulate Messages
Accenture mid-year Threatscape report identifies five global cybersecurity threats
98% of leading apps do not comply with GDPR according to Crownpeak study
Bugcrowd University Launches Free Hands-on Training For Security Professionals
Cybercriminals Targeting Popular Job Recruitment Portals About More Than PII
Data Privacy is hard, but finding the right DPO is harder
Accenture: CNI and Supply Chains at Risk
Major Vulnerability Discovered in Phones Sold by Four US Carriers
What Is the Next Wave of Development for Those Using Blockchain?
WhatsApp security snafu ‘could allow message manipulation’
A botnet of smart irrigation systems can deplete a city’s water supply
Comcast customer portal vulnerabilities exposed sensitive data
BIND DNS software vulnerability which could lead to DoS attacks exposed
Researchers aim to befuddle cybercriminals with defensive WWII fighter pilot trick
Over 20 Flaws Discovered in Popular Healthcare Software
Top 5 New Open Source Security Vulnerabilities in July 2018
# BHUSA : Reality of Infosec Mental Health Issues Detailed
There’s a global divide in how organizations assess cyber risk
Samsung Galaxy S7 Vulnerable To Hacking Due To Meltdown Security Flaw
# BHUSA : Politics and Cyber-Defense Are Colliding
Australia Post looks to peer endorsement for Digital ID
Hackers attacked the famous Russian media for the second time
# BHUSA : Better Collaboration and Recognition Can Make a Safer Internet
How Machine Learning Can Help Identify Web Defacement Campaigns
# BHUSA : Companies Encouraged to Adopt Sexual Harrassment Policies
Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats
A New Malicious Campaign Whip Around $60,000 of Bitcoin
Should I infect this PC, wonders malware. Let me ask my neural net…
Cyber hygiene: Where do organizations fall behind on basics?
Revealed: El Reg blew lid off Meltdown CPU bug before Intel told US govt – and how bitter tech rivals teamed up
Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals
Latest Hacking News Podcast #95
Photo gallery: Black Hat USA 2018
IoT security: Lessons we can learn from the evolution of road safety
The Importance of Using an SSL Certificate on Your Website
Flaw in BIND Security Feature Allows DoS Attacks
For Sale: U.S. Military ‘Reaper Drone’ Designs
Facial Recognition Will be Used at Tokyo Olympics to Improve Security
New WhatsApp Vulnerability Allows Hackers to Intercept and Change Message Contents
Microsoft releases new Windows 10 preview with dark theme for File Explorer
White Hat to Black Hat: What Motivates the Switch to Cybercrime
The PGA Possibly Infected With the BitPaymer Ransomware
Perception Point launches anti-malware solution for shared drives
Beware: Real Estate Scams are Growing
Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications
Ziften adds AV to the Zenith endpoint protection platform to stop attacks
Bugcrowd University to provide hands-on training for security researchers
wolfSSL announces the first commercial release of TLS 1.3
DarkHydrus Uses Open Source Phishery Tool in Middle-East Attacks
WhatsApp Vulnerability Allows Attackers to Alter Messages in Chats
Capsule8 secures $15M in Series B round
If for some reason you’re still using TKIP crypto on your Wi-Fi, ditch it – Linux, Android world bug collides with it
The Next Milestone for the NYS DFS Cybersecurity Regulation is Approaching
ISC Stormcast For Thursday, August 9th 2018 https://isc.sans.edu/podcastdetail.html&# x 3f;id=6116, (Thu, Aug 9th)
Data Security Solutions for Small Businesses
Australia gets interim National Data Commissioner
Heartland Tech Weekly: How Duo Security built a $2.35 billion company in Ann Arbor
Microsoft to hackers: Finding Hyper-V bugs is hard. Change my mind. PS: Here’s a head start…
No, The Mafia Doesn’t Own Cybercrime: Study
Researchers Release Free TRITON/TRISIS Malware Detection Tools
# BHUSA Reality of Infosec Mental Health Issues Detailed
That XKCD on voting machine software is wrong
3 Key Elements of Threat Intelligence Management
Microchip Security Flaw inside Samsung Galaxy S7 smartphones
Google Chrome Now Uses Native Windows 10 Notifications
ONS: 26% Of Smartphone Users Do Not Use Smartphone Security
Stress, bad workplace cultures are still driving security folk to drink
Google Releases Details on New Shielded VMs Cloud Security Tools
Windows 10 to get new ‘InPrivate Desktop’ security feature
ISC Releases Security Advisory for BIND
Amazon Alexa To Be Installed In Some SEAT Car Models
Google Engineering Lead on Lessons Learned From Chrome’s HTTPS Push
Generated on 2018-08-10 23:45:11.296746

Read More…