Cybersecurity News
Chrome 84 released with support for blocking notification popups on spammy sites
Other new features that shipped with Chrome 84 include a new animations engine and a one-tap system for importing SMS passcodes into Chrome web forms.14 July 2020
Critical DNS Bug Opens Windows Servers to Infrastructure Hijacking
Microsoft gives the ‘wormable’ flaw a security rating of 10 – the most severe warning possible.14 July 2020
'Make Your Bed' and Other Life Lessons for Security
Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.14 July 2020
Microsoft July 2020 Patch Tuesday fixes 123 vulnerabilities
This month's patches fix a major wormable bug in the Windows Server DNS component.14 July 2020
SigRed: A 17-year-old 'wormable' vulnerability for hijacking Microsoft Windows Server
The vulnerability, fixed in Microsoft's Patch Tuesday, has been awarded a severity rating of 10.0.14 July 2020
Adobe Discloses Critical Code-Execution Bugs in July Update
The software giant released patches for four critical vulnerabilities and five different platforms.14 July 2020
Women in Payments: Q&A with Lisa Conroy
Though she didn’t initially set out to prevent crime, when Lisa Conroy was first involved in data security breaches at her company, she became hooked. In this month’s blog series, Conroy explains how she discovered her true calling by accident.
14 July 2020
Google Cloud Unveils 'Confidential VMs' to Protect Data in Use
Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.14 July 2020
DMARC Adoption Spikes, Higher Ed Remains Behind
As colleges and universities prepare for the fall semester, email protections against surging threats like BEC and phishing are lagging.14 July 2020
Critical Vulnerability Hits SAP Enterprise Applications
RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.14 July 2020
Crypto-Primer: Encryption Basics Every Security Pro Should Know
With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.14 July 2020
New Mirai Variant Surfaces With Exploits for 9 Vulnerabilities Products
Impacted products include routers, IP cameras, DVRs, and smart TVs.14 July 2020
Leaked Details of 142 Million MGM Hotel Guests Found for Sale Online
Scope of last summer’s data leak at the hotel chain appears to be far more expansive than previously thought.14 July 2020
Most Companies Are Ignoring Your Most Vulnerable Endpoint…and It’s Not the Laptop
Cybercriminals know that mobile devices are less secure, so it’s no surprise that last year Verizon found that 4 in 10 companies were breached through a mobile device.14 July 2020
Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA
Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.14 July 2020
Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web
Last summer’s data leak at the hotel chain appears to be far more expansive than previously thought -- or the credentials could come from a hack of DataViper.14 July 2020
99% of Websites at Risk of Attack Via JavaScript Plug-ins
The average website includes content from 32 different third-party JavaScript programs, new study finds.14 July 2020
EFF’s new database reveals what tech local police are using to spy on you
An interactive map shows you everything from Ring partnerships to predictive policing.14 July 2020
Welcome Chat as a secure messaging app? Nothing could be further from the truth
ESET research uncovers a malicious operation that both spies on victims and leaks their data
The post Welcome Chat as a secure messaging app? Nothing could be further from the truth appeared first on WeLiveSecurity
14 July 2020
Critical SAP Bug Allows Full Enterprise System Takeover
Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.14 July 2020