Kernel Mode Threats & Practical Defenses: Part 2
In our lastpost, we described the evolution of kernel mode threats. These remain a prominent mode of compromise for nation-state attackers, as they are difficult to detect and enable robust...
View ArticleHYAS Adds Infosec Visionary Ariel Silverstone as Data Protection Officer,...
VICTORIA, British Columbia (BUSINESS WIRE) #cybersecurity ― HYAS , a leading provider of attribution intelligence solutions for infosec and cybersecurity professionals, today announced that long-time...
View ArticleRCN Stores Customer Passwords in Plain Text
An RCN representative, an American telephone, cable television, and internet service provider based in Princeton, New Jersey, just revealed on Twitter that the company stores their customers' passwords...
View ArticleMotorola Solutions Adds New Features to Ally Cloud-Based Security Software
Ally enables better communication and real-time information sharing between security organizations CHICAGO (BUSINESS WIRE) Motorola Solutions (NYSE:MSI) today announced new features for Ally , its...
View ArticleAssessing the Human Element in Cyber Risk Analysis
The human factor doesn’t have to be an intangible when assessing cyber risks within a company. Seventeen percent of data breaches started as social engineering attacks, mostly from email, according to...
View ArticleBaddies just need one email account with clout to unleash phishing hell
A single account compromise at an unnamed "major university" in the UK led to a large-scale phishing attack against third parties, according to data protection outfit Barracuda Networks. With one...
View Article$4.8 Billion Warehouse Management System Market Global Forecast to 2024 Re ...
DUBLIN (BUSINESS WIRE) The “Warehouse Management System Market by Offering (Software, Services), Deployment (On-Premise, On-Cloud), Tier Type (Advanced, Intermediate, Basic), Industry (3PL, Automotive,...
View ArticleCoinnest Executives Indicted for Accepting Bribe for Coin Listing
Exchanges 1 min ago| By Kevin Helms - | Coinnest Executives Indicted for Accepting Bribe for Coin Listing The Seoul Southern District Public Prosecutors’ Office has reportedly indicted two executives...
View ArticleTypical Workarounds For Compliant Logs
You may think you have logs. Chances are, you can rely on them only for tracing exceptions and debugging. But you can’t rely on them for compliance, forensics, or any legal matter. And that may be...
View ArticleSecurity researcher claims macOS Mojave privacy bug on launch day
A security researcher has claimed a new vulnerability in the latest version of macOS ― just hours before the software is due to be released. Patrick Wardle, chief researcher officer at Digita Security,...
View ArticleSecurity at Speed: A New Paradigm for a Secure DevOps Process
Since its first conference in Belgium in 2009, DevOps has gained mainstream acceptance. Organizations have caught on to its ability to create optimization on a whole new scale. This approach to...
View ArticleBarracuda Networks Sees More ATO Attacks Ahead
A new report published by Barracuda Networks warns the number of account takeover (ATO) incidents involving compromised email credentials is starting to rise. A study of 50 randomly selected...
View ArticleDon’t Look Away, Peekaboo Vulnerability May Allow Hackers to Play the Long Game
The newly named Peekaboo vulnerability is a zero-day flaw in China-based Nuuo’s video recorder technology.The flaw in NVRMini2, a network-attached storage device, has remained unfixed in the three...
View ArticleHow to Market Blockchain With Consensys and Lisk ― DZone Security
The dark days of the second half of 2017 are becoming a distant memory. The times of insane ICO valuations and token speculation excess were great for some but were a distraction from what makes...
View ArticleEducation sector data breaches skyrocket
You only have to look at the headlines to see that the education sector is under attack. One in five schools and colleges have fallen victim tocyber-crime, according toresearch from specialist insurer...
View ArticleBug? Feature? Power users baffled as BitLocker update switch-off continues
Three months on, users continue to report that Microsoft's BitLocker disk encryption technology turns itself off during security updates. The problem, which has prompted much head-scratching in...
View ArticleYubico Launches New Lineup of Multifactor FIDO2 Security Keys
It’s an open secret that passwords aren’t the most effective way to protect online accounts. Alarmingly, three out of four people use duplicate passwords, and 21 percent of people use codes that are...
View ArticleAlert Logic Report Reveals New Killchain Efficiencies and Cyber-Attack...
New Tactics Subvert Traditional Security Measures and Indiscriminately Strike Organizations of All Sizes HOUSTON (BUSINESS WIRE) Alert the leading provider of Security-as-a-Service solutions, today...
View ArticleDangerously Connected: The complexities of personal devices in the workplace
Ready to learn Cybersecurity?Browse courseslike Cyber Security for the IoT developed by industry thought leaders and Experfy in Harvard Innovation Lab. “Everyone wants to be connected,” Eric Montague...
View ArticleThe Sony hacker indictment: 5 lessons for IT security
In August 2018, the US Department of Justice (DoJ) unsealed the indictment of a North Korean spy, Park Jin Hyok, whom they claim was behind the hack against Sony and the creation and distribution of...
View Article