Cybersecurity News
U.S. Gov Agency Targeted With Malware-Laced Emails

23 January 2020
Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia

23 January 2020
Deconstructing Web Cache Deception Attacks: They're Bad; Now What?

23 January 2020
Severe Vulnerabilities Discovered in GE Medical Devices
CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.23 January 2020
MDhex vulnerabilities impact GE patient vital signs monitoring devices
GE Healthcare plans to release patches in Q2 2020.23 January 2020
Someone is uninstalling the Phorpiex malware from infected PCs and telling users to install an antivirus
Malware analysts believe someone has hijacked the Phorpiex botnet from its creator and is sabotaging its operations by alerting users they've been infected.23 January 2020
Cisco Warns of Critical Network Security Tool Flaw

23 January 2020
Weathering the Privacy Storm from GDPR to CCPA & PDPA
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.23 January 2020
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.23 January 2020
Microsoft exposed 250 million customer support records
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
The post Microsoft exposed 250 million customer support records appeared first on WeLiveSecurity
23 January 2020
Microsoft exposed 250 million customer support records
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
The post Microsoft exposed 250 million customer support records appeared first on WeLiveSecurity
23 January 2020
Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking

23 January 2020
To Avoid Disruption, Ransomware Victims Continue to Pay Up
For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.23 January 2020
Securely Disposing Mobile Devices
Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.23 January 2020
Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment

22 January 2020
Apple Addresses iPhone 11 Location Privacy Concern
Apple is rolling out a new update to its iOS operating system that addresses the location privacy issue on iPhone 11 devices that was first detailed here last month.22 January 2020
Vivin Nets Thousands of Dollars Using Cryptomining Malware

22 January 2020
For Mismanaged SOCs, The Price Is Not Right
New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.22 January 2020
A timeline of events surrounding the Bezos phone hack
Bezos hack connected to Khashoggi murder and the Washington Post's subsequent media coverage.22 January 2020
Eight Flaws in MSP Software Highlight Potential Ransomware Vector
An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies.22 January 2020