Cybersecurity News
Indexsinas SMB Worm Campaign Infests Whole Enterprises

30 June 2021
Attackers Already Unleashing Malware for Apple macOS M1 Chip
Apple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.30 June 2021
Global police shut down VPN service favored by cybercriminals
A global operation takes down the infrastructure of DoubleVPN and seizes data about its customers
The post Global police shut down VPN service favored by cybercriminals appeared first on WeLiveSecurity
30 June 2021
Intl. Law Enforcement Operation Takes Down DoubleVPN
The VPN service allegedly provided a means for cybercriminals to target their victims, Europol officials report.30 June 2021
3 Things Every CISO Wishes You Understood
Ensuring the CISO's voice is heard by the board will make security top of mind for the business, its employees, and their customers.30 June 2021
7 Skills the Transportation Sector Needs to Fuel Its Security Teams

30 June 2021
Why MTTR is Bad for SecOps

30 June 2021
Zero-Day Used to Wipe My Book Live Devices

30 June 2021
PoC Exploit Circulating for Critical Windows Print Spooler Bug

30 June 2021
Is Compliance-Only Security Giving Cybercriminals Your Security Playbook?
Compliance-only security strategies aren't working. CISOs should squarely focus on being secure while achieving compliance.30 June 2021
9 Hot Trends in Cybersecurity Mergers & Acquisitions

30 June 2021
Feds Told to Better Manage Facial Recognition, Amid Privacy Concerns

30 June 2021
Common Facebook scams and how to avoid them
Are you on Facebook? So are scammers. Here are some of the most common con jobs on Facebook you should watch out for and how you can tell if you’re being scammed.
The post Common Facebook scams and how to avoid them appeared first on WeLiveSecurity
30 June 2021
Google Updates Vulnerability Data Format to Support Automation
The Open Source Vulnerability schema supports automated vulnerability handling in Go, Rust, Python, and Distributed Weakness Filing system, and it could be the favored format for future exporting of data.29 June 2021
Ransomware Losses Drive Up Cyber-Insurance Costs
Premiums have gone up by 7% on average for small firms and between 10% and 40% for medium and large businesses.29 June 2021
Users Clueless About Cybersecurity Risks: Study

29 June 2021
CISA Publishes Catalog of Poor Security Practices
Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.29 June 2021
Survey Data Reveals Gap in Americans' Security Awareness
Survey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.29 June 2021
Technology's Complexity and Opacity Threaten Critical Infrastructure Security
Addressing the complexity of modern distributed software development is one of the most important things we can do to decrease supply chain risk.29 June 2021
Microsoft Translation Bugs Open Edge Browser to Trivial UXSS Attacks

29 June 2021