Cybersecurity News
Two-Step Verification
Two-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verification for your most important accounts such as email, financial and retirement accounts.Ransomware Task Force Publishes Framework to Fight Global Threat
An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.New Threat Group Carrying Out Aggressive Ransomware Campaign
UNC2447 observed targeting now-patched vulnerability in SonicWall VPN.Government agencies could access personal data without consent under new bill

Privacy advocates fear Coalition’s proposed data-sharing law could allow for robodebt-style tactics
Australians’ personal information could be accessed by government agencies and researchers without their consent under proposed data-sharing legislation that critics say could pave the way for more robodebt-style tactics.
In a speech at an Australian Financial Review conference this week, the former government services minister Stuart Robert said it wasn’t his job to make government “sexy”, but make it simple.
Related: Facebook data leak: Australians urged to check and secure social media accounts
Related: Government investigates data breach revealing details of 774,000 migrants
Continue reading...PortDoor Espionage Malware Takes Aim at Russian Defense Sector

MITRE Adds MacOS, More Data Types to ATT&CK Framework
Version 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure.MITRE Adds MacOS, Linux, More Data Types to ATT&CK Framework
Version 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure.WeSteal: A Cryptocurrency-Stealing Tool That Does Just That

Survey Finds Broad Concern Over Third-Party App Providers Post-SolarWinds
Most IT and cybersecurity professionals think security is important enough to delay deployment of applications, survey data shows.Is the SolarWinds Hack Really a Seismic Shift?

Ghost Town Security: What Threats Lurk in Abandoned Offices?

Week in security with Tony Anscombe
Governments as cyber-targets – FBI and Have I Been Pwned team up to notify Emotet victims – Mac users urged to plug a serious security hole
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
The Ticking Time Bomb in Every Company's Code
Developers must weigh the benefits and risks of using third-party code in Web apps.7 Modern-Day Cybersecurity Realities

Microsoft Warns 25 Critical Vulnerabilities in IoT, Industrial Devices

SAP admits to ‘thousands’ of illegal software exports to Iran
SAP says it accepts “full responsibility for past conduct.”WeSteal: A ‘shameless’ cryptocurrency stealer sold in the underground
The brazen developer doesn’t even try to hide their creation’s true purpose.ISC urges updates of DNS servers to wipe out new BIND vulnerabilities
The security flaws could lead to remote exploitation.XDR Pushing Endpoint Detection and Response Technologies to Extinction
Ironically, EDR's success has spawn demand for technology that extends beyond it.Babuk Ransomware Gang Mulls Retirement
