Cybersecurity News
SBA reveals potential data breach impacting 8,000 emergency business loan applicants
A US Senator says that the White House has “got to get it together.”ESET takes down VictoryGate cryptomining botnet
More than 35,000 computers believed to have been infected, according to ESET's sinkhole data.Scammers are now taking advantage of US small business relief fund in phishing emails
New campaigns are capitalizing not just on coronavirus fears but also on the outbreak’s financial ramifications.Following ESET’s discovery, a Monero mining botnet is disrupted
ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via infected USB drives
The post Following ESET’s discovery, a Monero mining botnet is disrupted appeared first on WeLiveSecurity
Email bungle at company seeking jobkeeper payments exposes staff's personal details

Names, addresses and birthdates of more than 100 people shared in privacy breach
The company responsible for delivering traffic reports on radio and TV stations across Australia accidentally sent out the dates of birth, names and home addresses of more than 100 current and former staff to potentially thousands of people as the company seeks to apply for the jobkeeper payments.
Australian Traffic Network provides short traffic report updates during news bulletins to 80 radio and television stations, including the ABC, Seven, Nine, 10, 2GB and Triple M.
Related: As Australia takes on Google and Facebook over news content, the world is watching | Margaret Simons
Continue reading...Valve says it's safe to play CS:GO and TF2 after source code leaked online
Old 2017 source code for Counter-Strike: Global Offensive and Team Fortress 2 leaked online today on 4chan.Attackers Prefer Ransomware to Stealing Data
Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave.IBM Cloud Data Shield Brings Confidential Computing to Public Cloud
The Cloud Data Shield relies on confidential computing, which protects data while it's in use by enterprise applications.Fast-Moving DDoS Botnet Exploits Unpatched ZyXel RCE Bug

Apple iOS Zero-Day Vulnerabilities Exploited in Targeted Attacks
One of the flaws is remotely exploitable with no user interaction needed, ZecOps says.NSA Issues Guidance for Combating Web Shell Malware
The US intelligence agency teamed up with Australian Signals Directorate in newly released information on how to protect Web servers from the malware.5 Ways to Prove Security's Worth in the Age of COVID-19

11 Tips for Protecting Active Directory While Working from Home
To improve the security of your corporate's network, protect the remote use of AD credentials.Security researcher identifies new APT group mentioned in 2017 Shadow Brokers leak
Shadow Brokers data dump yields another one of its secretsLearning From the Honeypot: A Researcher and a Duplicitous Docker Image

Apple Patches Two iOS Zero-Days Abused for Years

Connected Home Hubs Open Houses to Full Remote Takeover

Making the Case for Process Documentation in Cyber Threat Intel
Standard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a mustLA County Hit with DoppelPaymer Ransomware Attack
