Cybersecurity News
How Elite Protectors Operationalize Security Protection
There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.28 May 2020
Valak Loader Revamped to Rob Microsoft Exchange Servers

28 May 2020
All the security features added in the Windows 10 May 2020 update
Windows 10 v2004 comes with Windows Sandbox improvements, WiFi 6, WPA3, and Windows Hello in Safe Mode.28 May 2020
Valak targets Microsoft Exchange servers to steal enterprise data
The malware has been “dramatically changed” in the past six months.28 May 2020
Michigan State University hit by ransomware gang
The operators of the NetWalker ransomware gang have given MSU officials seven days to pay the ransom or they will leak stolen university files.27 May 2020
Google highlights Indian 'hack-for-hire' companies in new TAG report
Google also discloses seven coordinated political influence campaigns that took place on its platforms during Q1 2020.27 May 2020
Stay-at-Home Orders Coincide With Massive DNS Surge
A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.27 May 2020
Cloud Security Architect Proves Hardest Infosec Role to Fill
Nearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.27 May 2020
DoubleGun Group Builds Massive Botnet Using Cloud Services

27 May 2020
Security 101: SQL Injection

27 May 2020
HackerOne Bounties Hit $100M Milestone
The bug-hunting platform has now paid more than $100 million in bounties since October 2013.27 May 2020
Standing Privilege: The Attacker's Advantage

27 May 2020
‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App
![‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App ‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App](https://media.threatpost.com/wp-content/uploads/sites/103/2020/05/27122021/contact-tracing-150x150.jpg)
27 May 2020
GDPR Enforcement Loosens Amid Pandemic
The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.27 May 2020
Microsoft warns about attacks with the PonyFinal ransomware
PonyFinal infections have been reported in India, Iran, and the US.27 May 2020
Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.27 May 2020
Critical Android flaw lets attackers hijack almost any app, steal data
Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers
The post Critical Android flaw lets attackers hijack almost any app, steal data appeared first on WeLiveSecurity
27 May 2020
OpenSSH to deprecate SHA-1 logins due to security risk
Breaking a SHA-1-generated SSH authentication key now costs roughly $50,000, putting high-profile remote servers at risk of attacks.27 May 2020
What the World's Elite Protectors Teach Us about Cybersecurity
How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.27 May 2020
6 Steps Consumers Should Take Following a Hack

27 May 2020