Cybersecurity News
Majority of Network, App-Layer DDoS Attacks in 2019 Were Small
Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.05 February 2020
Department of Energy Adds Attivo Decoys for Critical Infrastructure Security
The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.05 February 2020
IoT Malware Campaign Infects Global Manufacturing Sites
The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.05 February 2020
Emotet Preps for Tax Season with New Phishing Campaign
Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.05 February 2020
CamuBot Banking Trojan Returns In Targeted Attacks
The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.05 February 2020
What is a Privileged Access Workstation (PAW)?
Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.05 February 2020
Bug hunter finds cryptocurrency-mining botnet on DOD network
Monero-mining botnet infects one of the DOD's Jenkins servers.05 February 2020
Keeping Compliance Data-Centric Amid Accelerating Regulation
As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.05 February 2020
New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers
Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.05 February 2020
Chrome to block intrusive video ads starting August 5, 2020
Google to implement new quality standard for video ads for Chrome, but also YouTube.05 February 2020
WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE
A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.05 February 2020
Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast
The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities.05 February 2020
Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation
Cisco has released patches to address the five vulnerabilities, which could lead to remote code-execution and denial of service.05 February 2020
CDPwn vulnerabilities impact tens of millions of enterprise devices
CDPwn vulnerabilities can be used to escalate initial access and completely take over entire networks.05 February 2020
Hiring Untapped Security Talent Can Transform the Industry
Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting05 February 2020
UK small businesses say cyberattack fears, not cash flow, keeps them awake at night
The use of consumer rather than business-grade cybersecurity solutions is not helping matters.05 February 2020
Gamaredon APT Improves Toolset to Target Ukraine Government, Military
The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […]05 February 2020
Irish watchdog launches Google, Tinder GDPR data processing probe
The companies’ roles as data controllers are being examined in depth.05 February 2020
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.
The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity
05 February 2020
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.
The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity
05 February 2020