Cybersecurity News


Bug hunter finds cryptocurrency-mining botnet on DOD network

Monero-mining botnet infects one of the DOD's Jenkins servers.
05 February 2020

Keeping Compliance Data-Centric Amid Accelerating Regulation

As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.
05 February 2020

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.
05 February 2020

Chrome to block intrusive video ads starting August 5, 2020

Google to implement new quality standard for video ads for Chrome, but also YouTube.
05 February 2020

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.
05 February 2020

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities.
05 February 2020

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation Cisco has released patches to address the five vulnerabilities, which could lead to remote code-execution and denial of service.
05 February 2020

CDPwn vulnerabilities impact tens of millions of enterprise devices

CDPwn vulnerabilities can be used to escalate initial access and completely take over entire networks.
05 February 2020

Hiring Untapped Security Talent Can Transform the Industry

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting
05 February 2020

UK small businesses say cyberattack fears, not cash flow, keeps them awake at night

The use of consumer rather than business-grade cybersecurity solutions is not helping matters.
05 February 2020

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Gamaredon APT Improves Toolset to Target Ukraine Government, Military The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […]
05 February 2020

Irish watchdog launches Google, Tinder GDPR data processing probe

The companies’ roles as data controllers are being examined in depth.
05 February 2020

How to catch a cybercriminal: Tales from the digital forensics lab

What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.

The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity

05 February 2020

How to catch a cybercriminal: Tales from the digital forensics lab

What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.

The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity

05 February 2020

Microsoft says it detects 77,000 active web shells on a daily basis

Microsoft detects and tracks a daily average of around 77,000 active web shells, spread across 46,000 infected servers.
05 February 2020

Malware stew cooked up on Bitbucket, deployed in attacks worldwide

Bitbucket is being abused and used as the host for cryptocurrency miners, ransomware, and Trojans deployed in a single attack chain.
05 February 2020

Companies Pursue Zero Trust, but Implementers Are Hesitant

Almost three-quarters of enterprises plan to have a zero-trust access model by the end of the year, but nearly half of cybersecurity professionals lack the knowledge to implement the right technologies, experts say.
04 February 2020

Chrome 80 released with silent notification popups, support for same-site cookies

Chrome 80 also comes with support for blocking heavy-loading online ads.
04 February 2020

8 of the 10 Most Exploited Bugs Last Year Involved Microsoft Products

Six of them were the same as from the previous year, according to new Recorded Future analysis.
04 February 2020

SharePoint Bug Proves Popular Weapon for Nation-State Attacks

Thousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets.
04 February 2020