Cybersecurity News
Long-Term Effects of COVID-19 on the Cybersecurity Industry
The maelstrom of change we're going through presents a unique opportunity to become enablers. And to do that requires flexibility.22 June 2020
Cloud Threats and Priorities as We Head Into the Second Half of 2020

22 June 2020
BlueLeaks: Data from 200 US police departments & fusion centers published online
Activist group DDoSecrets published 296 GB of police data on Friday, June 19.22 June 2020
‘BlueLeaks’ Exposes Files from Hundreds of Police Departments
Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed "BlueLeaks" and made searchable via a new website by the same name, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals online.22 June 2020
Adobe wants users to uninstall Flash Player by the end of the year
Adobe Flash Player will reach End-Of-Life on December 31, 2020.20 June 2020
AMD says it will fix new CPU bugs by the end of June 2020
AMD Accelerated Processing Unit (APU) processors released between 2016 and 2019 impacted by new "SMM Callout" bugs.20 June 2020
Former DIA Analyst Sentenced to Prison Over Data Leak

19 June 2020
Australian Government Under Ongoing Cyberattack
Experts believe China is behind the attack campaign, but China denies responsibility.19 June 2020
Cloud Security Alliance Offers Tips to Protect Telehealth Data
As telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud.19 June 2020
Turn on MFA Before Crooks Do It For You
Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don't take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here's the story of one such incident.19 June 2020
Academics studied DDoS takedowns and said they're ineffective, recommend patching vulnerable servers
The volume of DDoS traffic to victims remained the same. The number of DDoS-for-hire domains went up.19 June 2020
News Wrap: Malicious Chrome Extensions Removed, CIA ‘Woefully Lax’ Security Policies Bashed

19 June 2020
What Will Cybersecurity's 'New Normal' Look Like?

19 June 2020
Week in security with Tony Anscombe
This week, ESET researchers released their findings about Operation In(ter)ception, a campaign that leveraged LinkedIn-based spearphishing and took aim at aerospace and military companies in Europe and the Middle East between September and December 2019. Another major research effort by ESET experts revealed a campaign by the InvisiMole group that targeted high-profile organizations in the
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
19 June 2020
'New Normal' Caption Contest Winners

19 June 2020
How to Secure Machine Learning
Part two of a series on avoiding potential security risks with ML.19 June 2020
Elon Musk Bitcoin vanity addresses used to scam users out of $2 million
While Bitcoin giveaway scams have been around for more than two years, new trick helps scammers net massive profits.19 June 2020
Netgear Zero-Day Allows Full Takeover of Dozens of Router Models

19 June 2020
Cyberbullying: Adults can be victims too
Cyberbullying can happen to anyone, at any time – and at any age. How can adults deal with various forms of online abuse and harassment?
The post Cyberbullying: Adults can be victims too appeared first on WeLiveSecurity
19 June 2020
New Zealand CERT issues advisory on ransomware campaign
New Zealand CERT issues advisory on ransomware campaign By William Knowles Senior Editor InfoSec News June 18, 2020 The New Zealand Computer Emergency Response Team (CERT NZ) has released an advisory on a ransomware campaign leveraging remote access technologies. Unknown malicious cyber bad actors are targeting organizations’ networks through remote access tools, such as Remote […]18 June 2020