Cybersecurity News
What Your Company Needs to Know About Hardware Supply Chain Security
By establishing a process and framework, you can ensure you're not giving more advanced attackers carte blanche to your environment.27 February 2020
IoT Insecurity: When Your Vacuum Turns on You

27 February 2020
RSA 2020 – Hacking humans
What the human battle against biological viruses can teach us about fighting computer infections – and vice versa
The post RSA 2020 – Hacking humans appeared first on WeLiveSecurity
27 February 2020
Cisco patches incoming to address Kr00k vulnerability impacting routers, firewall products
There are no workarounds for the Wi-Fi communications bug.27 February 2020
US government authorities fail to train employees on ransomware detection, prevention
New research suggests that the majority of state and local governments are not rising to the challenge of mitigating ransomware threats.27 February 2020
Did someone file your taxes before you?
With tax season – and tax scams – in full swing, here’s how fraudsters can steal your tax refund, and how you can avoid becoming a victim
The post Did someone file your taxes before you? appeared first on WeLiveSecurity
27 February 2020
Android malware can steal Google Authenticator 2FA codes
A new version of the "Cerberus" Android banking trojan will be able to steal one-time codes generated by the Google Authenticator app and bypass 2FA-protected accounts.27 February 2020
'Cloud Snooper' Attack Circumvents AWS Firewall Controls
Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.27 February 2020
State of Cybersecurity Incident Response
27 February 2020
Got Backups?
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information at home (such as family photos) on a regular basis.27 February 2020
Billions of Devices Open to Wi-Fi Eavesdropping Attacks

26 February 2020
RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

26 February 2020
Tufin: How to Make Better Sense of the Cloud Security Equation
CEO Reuven Harrison examines how cloud services have changed how enterprises manage their apps and data, and also offers some tips for security pros tasked with managing either hybrid- or multi-cloud implementations. Harrison also takes on Kubernetes and container security in this News Desk interview.26 February 2020
RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

26 February 2020
How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'
Consider this your opportunity to educate.26 February 2020
US State Dept. Shares Insider Tips to Fight Insider Threats
The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.26 February 2020
Six suspected drug dealers went free after police lost evidence in ransomware attack
Seventh incident of its kind when police investigations were impacted by a ransomware infection.26 February 2020
Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities
JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capability as attacker behaviors start to change.26 February 2020
Elastic Security Makes Case For Blending 'Human Element,' Election Security
Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.26 February 2020
How to Prevent an AWS Cloud Bucket Data Leak

26 February 2020