Cybersecurity News
Proof-of-concept code published for Citrix bug as attacks intensify
Two Citrix bug (CVE-2019-19781) exploits have been published on GitHub yesterday, making future attacks trivial for most hackers.Alleged Member of Neo-Nazi Swatting Group Charged
Federal investigators on Friday arrested a Virginia man accused of being part of a neo-Nazi group that targeted hundreds of people in "swatting" attacks, wherein fake bomb threats, hostage situations and other violent scenarios were phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target's address.Synopsys Buys Tinfoil
Tinfoil Security's dynamic application and API security testing capabilities will be added to Synopsys Software Integrity Group.Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
The approach allowed researchers to use machine learning on encrypted data without first decrypting it.Hundreds of millions of cable modems are vulnerable to new Cable Haunt vulnerability
Cable modems using Broadcom chips are vulnerable to a new vulnerability named Cable Haunt, researchers say.6 Unique InfoSec Metrics CISOs Should Track in 2020

Cisco Webex Bug Allows Remote Code Execution

Lifeline Assistance Phone Users Targeted with ‘Uninstallable’ Adware

Indian National Pleads Guilty to Multimillion-Dollar Call Center Scam
The India-based call centers scammed US victims out of millions of dollars between 2013 and 2016.Week in security with Tony Anscombe
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
5 Tips on How to Build a Strong Security Metrics Framework
The carpentry maxim "measure twice, cut once" underscores the importance of timely, accurate, and regular metrics to inform security leaders' risk decisions.Study Points to Lax Focus on Cybersecurity
Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds.Connected cars: How to improve their connection to cybersecurity
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
The post Connected cars: How to improve their connection to cybersecurity appeared first on WeLiveSecurity
Connected cars: How to improve their connection to cybersecurity
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
The post Connected cars: How to improve their connection to cybersecurity appeared first on WeLiveSecurity
TrickBot hackers create new stealthy backdoor for high-value targets
PowerTrick is reserved for the most lucrative targets on the gang’s hit list.Oil-and-Gas APT Pivots to U.S. Power Plants

Man jailed for using data breach info leaks to claim over $12 million in IRS tax refunds
Information leaked due to data breaches was used to file fraudulent tax returns.Cybersecurity acquisitions run rampant this week: Who has bought what?
As a new year unfolds, so do portfolio changes and acquisition deals in the cybersecurity sector.Skype audio graded by workers in China with 'no security measures'

Exclusive: former Microsoft contractor says he was emailed login after minimal vetting
A Microsoft programme to transcribe and vet audio from Skype and Cortana, its voice assistant, ran for years with “no security measures”, according to a former contractor who says he reviewed thousands of potentially sensitive recordings on his personal laptop from his home in Beijing over the two years he worked for the company.
The recordings, both deliberate and accidentally invoked activations of the voice assistant, as well as some Skype phone calls, were simply accessed by Microsoft workers through a web app running in Google’s Chrome browser, on their personal laptops, over the Chinese internet, according to the contractor.
Continue reading...