Cybersecurity News


Cloud Threats and Priorities as We Head Into the Second Half of 2020

Cloud Threats and Priorities as We Head Into the Second Half of 2020 With millions working from home and relying on the cloud, security leaders are under increasing pressure to keep their enterprises breach-free.
22 June 2020

BlueLeaks: Data from 200 US police departments & fusion centers published online

Activist group DDoSecrets published 296 GB of police data on Friday, June 19.
22 June 2020

‘BlueLeaks’ Exposes Files from Hundreds of Police Departments

Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed "BlueLeaks" and made searchable via a new website by the same name, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals online.
22 June 2020

Adobe wants users to uninstall Flash Player by the end of the year

Adobe Flash Player will reach End-Of-Life on December 31, 2020.
20 June 2020

AMD says it will fix new CPU bugs by the end of June 2020

AMD Accelerated Processing Unit (APU) processors released between 2016 and 2019 impacted by new "SMM Callout" bugs.
20 June 2020

Former DIA Analyst Sentenced to Prison Over Data Leak

Former DIA Analyst Sentenced to Prison Over Data Leak A former Defense Intelligence Agency analyst leaked classified information to two journalists - one of whom he was dating - shedding light on insider threats.
19 June 2020

Australian Government Under Ongoing Cyberattack

Experts believe China is behind the attack campaign, but China denies responsibility.
19 June 2020

Cloud Security Alliance Offers Tips to Protect Telehealth Data

As telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud.
19 June 2020

Turn on MFA Before Crooks Do It For You

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don't take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here's the story of one such incident.
19 June 2020

Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers

The volume of DDoS traffic to victims remained the same. The number of DDoS-for-hire domains went up.
19 June 2020

News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed

News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed Insider threats, the CIA's bad security policies, and malicious Chrome extensions were the topics of discussion during this week's news wrap podcast.
19 June 2020

What Will Cybersecurity's 'New Normal' Look Like?

What Will Cybersecurity's 'New Normal' Look Like? The coronavirus pandemic has forced changes for much of the business world, cybersecurity included. What can we expect going forward?
19 June 2020

Week in security with Tony Anscombe

This week, ESET researchers released their findings about Operation In(ter)ception, a campaign that leveraged LinkedIn-based spearphishing and took aim at aerospace and military companies in Europe and the Middle East between September and December 2019. Another major research effort by ESET experts revealed a campaign by the InvisiMole group that targeted high-profile organizations in the

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

19 June 2020

'New Normal' Caption Contest Winners

'New Normal' Caption Contest Winners Competitors submitted lots of clever virus puns, and the prizes go to ...
19 June 2020

How to Secure Machine Learning

Part two of a series on avoiding potential security risks with ML.
19 June 2020

Elon Musk Bitcoin vanity addresses used to scam users out of $2 million

While Bitcoin giveaway scams have been around for more than two years, new trick helps scammers net massive profits.
19 June 2020

Netgear Zero-Day Allows Full Takeover of Dozens of Router Models

Netgear Zero-Day Allows Full Takeover of Dozens of Router Models An unpatched vulnerability in the web server of device firmware gives attackers root privileges, researchers said.
19 June 2020

Cyberbullying: Adults can be victims too

Cyberbullying can happen to anyone, at any time – and at any age. How can adults deal with various forms of online abuse and harassment?

The post Cyberbullying: Adults can be victims too appeared first on WeLiveSecurity

19 June 2020

New Zealand CERT issues advisory on ransomware campaign

New Zealand CERT issues advisory on ransomware campaign By William Knowles Senior Editor InfoSec News June 18, 2020 The New Zealand Computer Emergency Response Team (CERT NZ) has released an advisory on a ransomware campaign leveraging remote access technologies. Unknown malicious cyber bad actors are targeting organizations’ networks through remote access tools, such as Remote […]
18 June 2020

FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy

An information technology specialist at the Federal Emergency Management Agency (FEMA) was arrested this week on suspicion of hacking into the human resource databases of University of Pittsburgh Medical Center (UPMC) in 2014, stealing personal data on more than 65,000 UPMC employees, and selling the data on the dark web.
18 June 2020