Cybersecurity News
WhatsApp backtracks on app limitations if you refuse new privacy terms
App functionality will not be restricted if you refuse.03 June 2021
Securing Your Wi-Fi Access Point
The first step to creating a cybersecure home is to start by securing your Wi-Fi Access Point. Change your Wi-Fi Access Points default administrator password to something only you know. Many Wi-Fi Access Points or Wi-Fi routers are shipped with default administrator passwords that are publicly known and posted on the Internet.03 June 2021
Phishing Emails Remain in User Inboxes Over 3 Days Before They're Removed
Most malicious emails get blocked, but the ones that get through linger around dangerously long, a new study shows.02 June 2021
FireEye Sells Products Business to Symphony Group for $1.2B
The transaction will include the FireEye brand name; the business that remains will be called Mandiant Solutions.02 June 2021
Encryption Helps Companies Avoid Breach Notifications
With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds.02 June 2021
Podcast: The State of Ransomware
In this Threatpost podcast, Fortinet’s top researcher sketches out the ransom landscape, with takeaways from the DarkSide attack on Colonial Pipeline.02 June 2021
Effective Adoption of SASE in 2021
In this Threatpost podcast, Forcepoint’s SASE and Zero Trust director describes how the pandemic jump-started SASE adoption.02 June 2021
Banking Attacks Surge Along with Post-COVID Economy
FinTech fraud spikes 159 percent in Q1 2021 along with stimulus spending.02 June 2021
Microsoft Buys ReFirm Labs to Drive IoT Security Efforts
The acquisition will bring ReFirm's firmware analysis capabilities alongside Microsoft's Azure Defender for IoT to boost device security.02 June 2021
A View from Inside a Deception
Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC?02 June 2021
Wordpress Discloses Critical Zero-day in Fancy Product Designer Plugin
The plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.02 June 2021
Wordpress Discloses Critical Zero-day in Fancy Product Designer Plugin
The plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.02 June 2021
Is Your Adversary James Bond or Mr. Bean?
Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.02 June 2021
Microsoft 365: Most Common Threat Vectors & Defensive Tips
Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.02 June 2021
REvil Ransomware Ground Down JBS: Sources
Responsible nations don't harbor cybercrooks, the Biden administration admonished Russia, home to the gang that reportedly froze the global food distributor's systems.02 June 2021
Chaos for the Sake of Chaos? Yes, Nation-States Are That Cynical
Many nation-state-backed attacks are intended to destabilize the US government, not steal from it.02 June 2021
Processor Morphs Its Architecture to Make Hacking Really Hard
Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities.02 June 2021
This is how attackers bypass Microsoft's AMSI anti-malware scanning protection
Researchers outline common tactics for circumventing the security software.02 June 2021
DoJ Charges Rhode Island Woman in Phishing Scheme Against Politicians
Diana Lebeau allegedly tried to trick candidates for public office and related individuals into giving up account credentials by impersonating trusted associates and the Microsoft security team.02 June 2021
XSS vulnerability found in popular WYSIWYG website editor
The security flaw was found in how HTML sanitizing is performed.02 June 2021