Cybersecurity News
Businesses Improve Their Data Security, But Privacy - Not So Much
While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.29 January 2020
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.29 January 2020
Why Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.29 January 2020
Cynet Empowers IT Resellers and Service Providers to Become Fully Qualified MSSPs
Due to increasing cyber incidents, more and more organizations come to realize that outsourcing their defenses is increasing the MSSP market opportunities.29 January 2020
Why Companies Should Care about Data Privacy Day
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.29 January 2020
PCI SSC in Brazil: New Regional Engagement Board for 2020
PCI SSC has announced a newly expanded Brazil Regional Engagement Board. Here we talk with PCI SSC Associate Director, LA Region for Brazil, Carlos Caetano, about the value of the board, its role and agenda for 2020.
29 January 2020
Wawa Breach May Have Affected More Than 30 Million Customers
Hefty collection of U.S. and international payment cards from the incident revealed in December found up for sale on dark-web marketplace Joker’s Stash.29 January 2020
RCE in OpenSMTPD library impacts BSD and Linux distros
Vulnerability, tracked as CVE-2020-7247, can be exploited remotely over the internet.29 January 2020
NFL, Multiple NFL Teams' Twitter Accounts Hacked and Hijacked
Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.28 January 2020
Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise
The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.28 January 2020
Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise
The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says.28 January 2020
'Understand What You Believe': Fmr. FBI Agent Unpacks Information Threats
In the past few years, social media has transformed from a communications gold mine to a minefield of disinformation campaigns.28 January 2020
New ‘CacheOut’ Attack Targets Intel CPUs
Researchers have release a new proof-of-concept attack targeting a new Intel Speculative-type bug called CacheOut present in most Intel CPUs.28 January 2020
Wawa card breach may rank as one of the biggest of all times
Hackers put the card details of more than 30 million Wawa customers on sale online.28 January 2020
All major antivirus vendors will continue to support Windows 7 post EOL
Most antivirus programs will receive Windows 7 support for at least two more years.28 January 2020
Trolls-For-Hire Pave Way For Sophisticated Social Media Hacks
Threat actors leveraging social media for hacks and misinformation are growing more coordinated.28 January 2020
Wawa Breach May Have Compromised More Than 30 Million Payment Cards
In late December 2019, fuel and convenience store chain Wawa Inc. said a nine-month-long breach of its payment card processing systems may have led to the theft of card data from customers who visited any of its 850 locations nationwide. Now, fraud experts say the first batch of card data stolen from Wawa customers is being sold at one of the underground's most popular crime shops, which claims to have 30 million records to peddle from a new nationwide breach.28 January 2020
How Do I Get My Team Started with Container Security and Kubernetes?
Begin with one application, then give your tech team some time to learn.28 January 2020
Request for Comments: PCI PTS Point of Interaction (POI) v6
From 24 January to 24 February 2020, PCI SSC stakeholders can participate in a Request for Comments (RFC) on the PCI PTS Point of Interaction (POI) v6 Standard draft.
28 January 2020
Intel Previews Newest 'Zombieload' Patch
Intel has promised a third patch to remediate the Zombieload speculative execution vulnerability.28 January 2020