Two-Step VerificationTwo-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verification for your most important accounts such as email, financial and retirement accounts.
Ransomware Task Force Publishes Framework to Fight Global ThreatAn 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.
New Threat Group Carrying Out Aggressive Ransomware CampaignUNC2447 observed targeting now-patched vulnerability in SonicWall VPN.
Government agencies could access personal data without consent under new bill
Privacy advocates fear Coalition’s proposed data-sharing law could allow for robodebt-style tactics
Australians’ personal information could be accessed by government agencies and researchers without their consent under proposed data-sharing legislation that critics say could pave the way for more robodebt-style tactics.
In a speech at an Australian Financial Review conference this week, the former government services minister Stuart Robert said it wasn’t his job to make government “sexy”, but make it simple.
Related: Facebook data leak: Australians urged to check and secure social media accounts
Related: Government investigates data breach revealing details of 774,000 migrantsContinue reading...
PortDoor Espionage Malware Takes Aim at Russian Defense SectorThe stealthy backdoor is likely being used by Chinese APTs, researchers said.
MITRE Adds MacOS, More Data Types to ATT&CK FrameworkVersion 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure.
MITRE Adds MacOS, Linux, More Data Types to ATT&CK FrameworkVersion 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure.
WeSteal: A Cryptocurrency-Stealing Tool That Does Just ThatThe developer of the WeSteal cryptocurrency stealer can’t be bothered with fancy talk: they say flat-out that it’s “the leading way to make money in 2021”.
Survey Finds Broad Concern Over Third-Party App Providers Post-SolarWindsMost IT and cybersecurity professionals think security is important enough to delay deployment of applications, survey data shows.
Is the SolarWinds Hack Really a Seismic Shift?Oliver Tavakoli, CTO of Vectra AI, discusses the massive supply-chain hack's legacy and ramifications for security professionals.
Ghost Town Security: What Threats Lurk in Abandoned Offices?Millions of office buildings and campuses were rapidly abandoned during the pandemic. Now it's a year later - what happened in those office parks and downtown ghost towns? What security dangers lurk there now, waiting to ambush returning businesses?
Week in security with Tony Anscombe
Governments as cyber-targets – FBI and Have I Been Pwned team up to notify Emotet victims – Mac users urged to plug a serious security hole
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity