Cybersecurity News
FireEye’s bug bounty program goes public
42 vulnerabilities in FireEye domains have, so far, been resolved.13 August 2020
RedCurl cybercrime group has hacked companies for three years
New hacker group discovered; believed to operate out of Russia.13 August 2020
Unique Passwords
Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.13 August 2020
FireEye Announces New Bug-Bounty Program
The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.12 August 2020
Using 'Data for Good' to Control the Pandemic
The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.12 August 2020
Women in Payments: Q&A with Robin Trickel
Companies achieve more when a variety of perspectives are represented at the table. In this month’s blog series, Robin Trickel explains why having a culturally different, or non-traditional, background may be the key to success in cybersecurity.
12 August 2020
SANS Security Training Firm Hit with Data Breach
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.12 August 2020
ReVoLTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations
Academics detail a new attack on 4G encrypted calls. Attack works only when the attacker is on the same base station (mobile tower) as the victim.12 August 2020
What is the cost of a data breach?
The price tag is higher if the incident exposed customer data or if it was the result of a malicious attack, an annual IBM study finds
The post What is the cost of a data breach? appeared first on WeLiveSecurity
12 August 2020
Name That Toon: 'Rise' and Shine

12 August 2020
Citrix Warns of Critical Flaws in XenMobile Server

12 August 2020
Why & Where You Should You Plant Your Flag
Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags.12 August 2020
Threats vs. Thrift: Running Effective AppSec During a Global Crisis
By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness.12 August 2020
Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption
Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.12 August 2020
TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

12 August 2020
Adobe tackles critical code execution vulnerabilities in Acrobat, Reader
This month’s security update fixes a variety of critical and important bugs in the software.12 August 2020
Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal

11 August 2020
Researchers Trick Facial-Recognition Systems
Goal was to see if computer-generated images that look like one person would get classified as another person.11 August 2020
Microsoft Patches 120 Vulnerabilities, Two Zero-Days
The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.11 August 2020
Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft

11 August 2020