Cybersecurity News


'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices

Researchers discover 19 vulnerabilities in a TCP/IP software library manufacturers have used in connected devices for 20 years.
16 June 2020

Hosting Provider Hit With Largest-Ever DDoS Attack

Likely looking to make a statement, attackers targeted specific websites hosted by a single provider with a 1.44 terabit-per-second distributed denial-of-service attack, according to Akamai.
16 June 2020

CIA's 'Lax' Security Led to 2017 Compromise of Its Hacking Tools

Internal CIA report released today shows poor security controls surrounding the intelligence agency's hacking tools.
16 June 2020

Qbot Trojan Reappears to Go After U.S. Banking Customers

Qbot Trojan Reappears to Go After U.S. Banking Customers The 12-year-old malware is still dangerous, sporting advanced evasion techniques.
16 June 2020

Adobe Releases PDF Protected Mode for Acrobat DC

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
16 June 2020

Adobe Releases PDF Protected Mode for Document Cloud

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
16 June 2020

83% of Forbes 2000 Companies' Web Domains Are Poorly Protected

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.
16 June 2020

Adobe Patches 18 Critical Flaws in Out-Of-Band Update

Adobe Patches 18 Critical Flaws in Out-Of-Band Update Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.
16 June 2020

Super secretive Russian disinfo operation discovered dating back to 2014

Researchers uncover six-years-worth of Russian attempts to mold international politics using fake news and forged documents.
16 June 2020

Ransomware from Your Lawyer's Perspective

Three good reasons why your incident response team's first call after a data breach should be to outside counsel.
16 June 2020

Theft of CIA’s ‘Vault 7’ Secrets Tied to ‘Woefully Lax” Security

Theft of CIA’s ‘Vault 7’ Secrets Tied to ‘Woefully Lax” Security An internal investigation into the 2016 CIA breach condemned the agency's security measures, saying it “focused more on building up cyber tools than keeping them secure."
16 June 2020

Cisco Brings SecureX into Full Security Lineup to Cut Complexity

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.
16 June 2020

‘Ripple20’ Bugs Impact Hundreds of Millions of Connected Devices

‘Ripple20’ Bugs Impact Hundreds of Millions of Connected Devices The vulnerabilities affect everything from printers to insulin pumps to ICS gear.
16 June 2020

Half of Firms Likely Running Vulnerable Oracle E-Business Suite

Two security vulnerabilities could open up companies to financial attacks and compliance violations if the software is not updated, Onapsis says.
16 June 2020

Just Updated: PTS POI Standard

 

Today, PCI SSC has PCI PIN Transaction Security (PTS) Point-of-Interaction (POI) Modular Security Requirements v6.0. Updates are designed to meet the accelerating changes of payment device technology, while providing protections against criminals who continue to develop new ways to steal payment card data.

16 June 2020

Survey shows rise in robocalls amid COVID‑19 fears

The unsolicited phone calls tout everything from miracle cures to financial relief – here's how you can stay safe

The post Survey shows rise in robocalls amid COVID‑19 fears appeared first on WeLiveSecurity

16 June 2020

Avon recovering after mysterious cyber-security incident

Parts of the Avon It network has been down since last week, according to SEC documents.
16 June 2020

IoT Security Trends & Challenges in the Wake of COVID-19

The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.
16 June 2020

Ripple20 vulnerabilities will haunt the IoT landscape for years to come

Security researchers disclose 19 vulnerabilities impacting a TCP/IP library found at the base of many IoT products.
16 June 2020

Shadow IT: Why It’s Still a Major Risk in Today’s Environments

Shadow IT: Why It’s Still a Major Risk in Today’s Environments According to industry analyst firm Gartner, as many as one-third of successful attacks on enterprises target data that are housed in unsanctioned IT resources.
16 June 2020