Cybersecurity News
Majority of Network, App-Layer DDoS Attacks in 2019 Were Small
Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.05 February 2020
Department of Energy Adds Attivo Decoys for Critical Infrastructure Security
The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.05 February 2020
IoT Malware Campaign Infects Global Manufacturing Sites
The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.05 February 2020
Emotet Preps for Tax Season with New Phishing Campaign
Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.05 February 2020
CamuBot Banking Trojan Returns In Targeted Attacks

05 February 2020
What is a Privileged Access Workstation (PAW)?

05 February 2020
Bug hunter finds cryptocurrency-mining botnet on DOD network
Monero-mining botnet infects one of the DOD's Jenkins servers.05 February 2020
Keeping Compliance Data-Centric Amid Accelerating Regulation
As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.05 February 2020
New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

05 February 2020
Chrome to block intrusive video ads starting August 5, 2020
Google to implement new quality standard for video ads for Chrome, but also YouTube.05 February 2020
WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

05 February 2020
Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

05 February 2020
Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation

05 February 2020
CDPwn vulnerabilities impact tens of millions of enterprise devices
CDPwn vulnerabilities can be used to escalate initial access and completely take over entire networks.05 February 2020
Hiring Untapped Security Talent Can Transform the Industry
Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting05 February 2020
UK small businesses say cyberattack fears, not cash flow, keeps them awake at night
The use of consumer rather than business-grade cybersecurity solutions is not helping matters.05 February 2020
Gamaredon APT Improves Toolset to Target Ukraine Government, Military

05 February 2020
Irish watchdog launches Google, Tinder GDPR data processing probe
The companies’ roles as data controllers are being examined in depth.05 February 2020
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.
The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity
05 February 2020
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.
The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity
05 February 2020