Cybersecurity News
Google Updates Ad Policies to Counter Influence Campaigns, Extortion

03 August 2020
How much is your personal data worth on the dark web?
The going prices are lower than you probably think – your credit card details, for example, can sell for a few bucks
The post How much is your personal data worth on the dark web? appeared first on WeLiveSecurity
03 August 2020
Why Data Ethics is a Growing CISO Priority

03 August 2020
Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw

03 August 2020
Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.03 August 2020
CISA, DOD, FBI expose new Chinese malware strain named Taidoor
US government agencies say the Taidoor remote access trojan (RAT) has been used as far back as 2008.03 August 2020
Garmin Pays Up to Evil Corp After Ransomware Attack — Reports

03 August 2020
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.03 August 2020
Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes

03 August 2020
BlackBerry releases new security tool for reverse-engineering PE files
BlackBerry open-sources PE Tree, a new malware reverse-engineering tool for analyzing Portable Executable (PE) files.03 August 2020
NetWalker ransomware gang has made $25 million since March 2020
The NetWalker gang has established itself as one of the most dangerous ransomware groups out there.03 August 2020
A Patriotic Solution to the Cybersecurity Skills Shortage
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.03 August 2020
Meetup Critical Flaws Allow ‘Group’ Takeover, Payment Theft

03 August 2020
How Should I Securely Destroy/Discard My Devices?

03 August 2020
2gether hacked: €1.2m in cryptocurrency stolen, native tokens offered in exchange
Almost a third of funds stored in cryptocurrency investment accounts have been taken.03 August 2020
GandCrab ransomware distributor arrested in Belarus
Creator of the actual ransomware still at large.03 August 2020
Google: Eleven zero-days detected in the wild in the first half of 2020
A report from Google's Project Zero also looks at 2019 zero-day statistics and draws some interesting conclusions.02 August 2020
Phishing campaigns, from first to last victim, take 21h on average
Most phishing victims experience a fraudulent transaction around 5 days after getting phished, new research shows.01 August 2020
Author of FastPOS malware revealed, pleads guilty
A 30-year-old Moldovan man admitted this month to creating the FastPOS malware.01 August 2020
How the FBI tracked down the Twitter hackers
A timeline of the Twitter hack composed from court documents published today.31 July 2020