Cybersecurity News
Google highlights Indian 'hack-for-hire' companies in new TAG report
Google also discloses seven coordinated political influence campaigns that took place on its platforms during Q1 2020.27 May 2020
Stay-at-Home Orders Coincide With Massive DNS Surge
A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.27 May 2020
Cloud Security Architect Proves Hardest Infosec Role to Fill
Nearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.27 May 2020
DoubleGun Group Builds Massive Botnet Using Cloud Services

27 May 2020
Security 101: SQL Injection

27 May 2020
HackerOne Bounties Hit $100M Milestone
The bug-hunting platform has now paid more than $100 million in bounties since October 2013.27 May 2020
Standing Privilege: The Attacker's Advantage

27 May 2020
‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App
![‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App ‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App](https://media.threatpost.com/wp-content/uploads/sites/103/2020/05/27122021/contact-tracing-150x150.jpg)
27 May 2020
GDPR Enforcement Loosens Amid Pandemic
The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.27 May 2020
Microsoft warns about attacks with the PonyFinal ransomware
PonyFinal infections have been reported in India, Iran, and the US.27 May 2020
Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.27 May 2020
Critical Android flaw lets attackers hijack almost any app, steal data
Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers
The post Critical Android flaw lets attackers hijack almost any app, steal data appeared first on WeLiveSecurity
27 May 2020
OpenSSH to deprecate SHA-1 logins due to security risk
Breaking a SHA-1-generated SSH authentication key now costs roughly $50,000, putting high-profile remote servers at risk of attacks.27 May 2020
What the World's Elite Protectors Teach Us about Cybersecurity
How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.27 May 2020
6 Steps Consumers Should Take Following a Hack

27 May 2020
Hackers Sell Data from 26 Million LiveJournal Users on Dark Web

27 May 2020
Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.27 May 2020
Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques
Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.27 May 2020
New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD
Eighteen of the 26 bugs impact Linux. Eleven have been patched already.27 May 2020
26 million LiveJournal credentials leaked online, sold on the dark web
LiveJournal credentials were obtained in a 2014 hack, but leaked online earlier this month.26 May 2020