Cybersecurity News


3 Tips For Better Security Across the Software Supply Chain

It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture of the software supply chain.
06 August 2020

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.
06 August 2020

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.
06 August 2020

Firefox gets fix for evil cursor attack

Tech support scam group found a way to abuse Firefox's previous evil cursor patch to enable new attacks.
06 August 2020

U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling

U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.
06 August 2020

Smart locks can be opened with nothing more than a MAC address

Researchers demonstrated how remote attackers can steal UltraLoq digital keys with minimal effort.
06 August 2020

Smart locks opened with nothing more than a MAC address

Researchers demonstrated how remote attackers could steal UltraLoq digital keys with minimal effort.
06 August 2020

Black Hat: Hackers can remotely hijack enterprise, healthcare Temi robots

Temi’s interactive assistance robots are remotely exploitable with little more than a phone number.
06 August 2020

What A Security Engineer & Software Engineer Learned By Swapping Roles

A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
05 August 2020

Google said it took down ten influence operation campaigns in Q2 2020

Google said the influence ops were traced back to China, Russia, Iran, and Tunisia.
05 August 2020

Tales from the Trenches Show Security Issues Endemic to Healthcare

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.
05 August 2020

Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs

Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.
05 August 2020

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.
05 August 2020

Supporting Women in InfoSec

Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.
05 August 2020

Developing Community for Woman Infosec Pros in India

Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.
05 August 2020

Twitter Fixes High-Severity Flaw Affecting Android Users

Twitter Fixes High-Severity Flaw Affecting Android Users A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.
05 August 2020

US offers $10 million reward for hackers meddling in US elections

This includes attacks against US election officials, election infrastructure, voting machines, but also candidates and their staff.
05 August 2020

What to Tell Young People of Color About InfoSec Careers

CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.
05 August 2020

Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges

Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.
05 August 2020

SynerComm Reboots a Security Staple with 'Continuous' Pen Testing

SPONSORED CONTENT: Penetration testing has evolved well beyond a couple guys you hire to try and break into your network, according to SynerComm's Brian Judd. In addition to a service that offers round-the-clock pen testing, SynerComm also provides purple team testing, effectively splitting the difference with red- and blue-team exercises.
05 August 2020