Cybersecurity News


UK electricity middleman hit by cyber-attack

Elexon said the incident only impacted its internal IT network, employee laptops, and company email server.
14 May 2020

As Businesses Rush to the Cloud, Security Teams Struggle to Keep Up

Most organizations have a gap between current and planned cloud usage and the maturity of their cloud security programs.
14 May 2020

Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks

Fix released in February is Microsoft's second pass at fully addressing issue that Check Point first disclosed at Black Hat USA last summer.
14 May 2020

Innovative Spy Trojan Targets European Diplomatic Targets

Innovative Spy Trojan Targets European Diplomatic Targets Descended from the COMPFun RAT, the malware can propagate to removable drives.
14 May 2020

Project Aims to Unmask Disinformation Bots

BotSight, a machine learning research project, rates Twitter users based on the likelihood that there is a human behind the keyboard. Could such technology blunt the impact of disinformation campaigns?
14 May 2020

Identite Comes Out of Stealth

Startup emerges with three-factor, no-password authentication.
14 May 2020

Google to block ads that use too many system resources starting August 2020

New "Heavy Ad Intervention" will save battery life and network bandwidth usage on mobile data plans.
14 May 2020

8 Supply Chain Security Requirements

8 Supply Chain Security Requirements Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
14 May 2020

TikTok Violated Children’s Privacy Law, FTC Complaint Says

TikTok Violated Children’s Privacy Law, FTC Complaint Says A group of children's privacy advocates alleged in a recent FTC complaint that TikTok violated an agreement to protect children's private data.
14 May 2020

Russian hacker group use HTTP status codes to control malware implants

New Turla cyber-espionage operation targets diplomatic entities in Europe with new COMpfun malware.
14 May 2020

Russian hacker group using HTTP status codes to control malware implants

New Turla cyber-espionage operation targets diplomatic entities in Europe with new COMpfun malware.
14 May 2020

Compliance as a Way to Reduce the Risk of Insider Threats

Several key resources and controls can help reduce overall risk by providing guidance on proper control implementation, preventative measures to deploy, and an emphasis on organizationwide training.
14 May 2020

79% of Companies Report Identity-Related Breach in Past Two Years

Two-thirds of organizations surveyed say phishing is the most common cause of identity-related breaches, the IDSA reports.
14 May 2020

Facebook Fails to Staunch Coronavirus Misinformation

The social media giant in April affixed warning labels on 50 million pieces of content
14 May 2020

Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders

Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders Microsoft is letting Windows Insiders test-drive DNS-over-HTTPS protocol in a pre-release build of Windows 10.
14 May 2020

Ensuring Business Continuity in Times of Crisis

Three basic but comprehensive steps can help you and your organization get through adversity
14 May 2020

Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App

Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App "Healthy Together” app uses a raft of location data, including GPS, cell tower triangulation and Bluetooth, to pinpoint users and ID coronavirus hotspots.
14 May 2020

BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks

BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks BEC gangs like "Exaggerated Lion" are using tricky tactics - like exploiting G Suite - to scam companies out of millions.
14 May 2020

Login with Facebook Bug Earns $20K Bounty

Login with Facebook Bug Earns $20K Bounty The cross-site scripting vulnerability could have allowed trivial account takeover.
14 May 2020

Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia

ESET researchers dissect a backdoor deployed in attacks against multiple government agencies and major organizations operating in two critical infrastructure sectors in Asia

The post Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia appeared first on WeLiveSecurity

14 May 2020