BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Saudi Arabia Hacked Amazon Boss's Phone, Investigator Says

Bezos
Image copyright Reuters Image caption Mr Bezos' text messages to his lover were published by the National Enquirer An investigator for Amazon boss Jeff Bezos says that Saudi Arabia hacked Mr...
Continue reading
  0 Comments
0 Comments

Unleash The Hash - ShadowHammer MAC Address List

hashing routine constants
Disassembly of hashing routine
salt (0xad,0x12,0xf4,0x19) followed by 70:8B:CD:10:43:18
Hashcat code modification
Get the [almost] full list of MAC addresses that were targeted in the ASUS breach, and share our pain in the short story of extracting them. TL;DR: The latest list of...
Continue reading
  0 Comments
0 Comments

F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint

Sqn Ldr Andy Edgell, lead RAF test pilot, F-35 trials
One of the UK's new F-35Bs touches down at RAF Marham after its transatlantic flight. Pic: Crown copyright/MoD
The F-35 aircraft remains woefully unprepared against malware infections and other cyber-attacks, according to POGO – the respected non-profit watchdog Project on Government Oversight. Dubbed the most expensive weapon system in...
Continue reading
  0 Comments
0 Comments

Lazarus Group Widens Tactics In Crypto Currency Attacks

Original link
Continue reading
  0 Comments
0 Comments

Google Drops Zero Day On TP-Link Smart Home Routers


Google Project Zero accuses Linux of sloppy kernel patching Project Zero accuses Linux distributions of leaving users exposed to known kernel vulnerabilities for weeks. A zero-day vulnerability impacting TP-Link SR20 smart...
Continue reading
  0 Comments
0 Comments

Is US Foreign Cyber-Policy on Track?

Cybersecurity , Standards, Regulations & Compliance Ex-Cyber Czar Chris Painter on Where US is Getting it Right - and Wrong( SecurityEditor ) • March 26, 2019     Chris Painter, commissioner of...
Continue reading
  0 Comments
0 Comments

Steve Katz on Cybersecurity's State of the Union

Cybersecurity , Security Operations World's First CISO Weighs in on the Technologies and Trends Shaping 2019( SecurityEditor ) • March 26, 2019     Steve Katz, former CISO at Merrill Lynch and...
Continue reading
  0 Comments
0 Comments

GAO: Equifax-Like Breaches Require Greater Civil Penalties

GAO: Equifax-Like Breaches Require Greater Civil Penalties
Data Breach , Fraud Management & Cybercrime , GLBA Report Calls for New Rules to Pave the Way for Bigger Fines• March 26, 2019     One way to ensure greater...
Continue reading
  0 Comments
0 Comments

Raising the Corporate Security Understanding

Cybersecurity , Governance Korn Ferry CISO Michael Miora on Improving Enterprise Response to Threats( SecurityEditor ) • March 26, 2019     Michael Miora, senior vice president and CISO of Korn...
Continue reading
  0 Comments
0 Comments

Researchers Get Free Tesla For Finding Infotainment System Bug

image

Tesla awarded two researchers a car after they found a vulnerability in the vehicle’s infotainment system which allowed them to commandeer the vehicle.   The exploit was found during the Pwn2Own...
Continue reading
  0 Comments
0 Comments

EU Backs Controversial Copyright Law

A protestor holds a banner reading "No meme is illegal" during the "Save The Internet" demonstration in Berlin, Germany
Image copyright EPA Image caption 'No meme is illegal': Protests were held against the copyright law changes Copyright laws which critics say could change the internet have been voted in by...
Continue reading
  0 Comments
0 Comments

Casino Screw Up Royale: A Tale Of Ethical Hacking Gone Awry

People who find security vulnerabilities commonly run into difficulties when reporting them to the responsible company. But it's less common for such situations to turn into tense trade-show confrontations—and competing claims...
Continue reading
  0 Comments
0 Comments

iOS 12.2 Fixes Bug That Granted Hidden Microphone Access

iPhone iOS
Apple released yesterday iOS version 12.2 that, like never before, includes fixes for a considerable number of security-related issues, including some that are downright disturbing. In total, the company fixed 51...
Continue reading
  0 Comments
0 Comments

Why Simpler is Better for CISOs

Governance , Security Operations Trend Micro's Steve Neville on Managing Today's Complex Technical Landscape( euroinfosec ) • March 25, 2019     Steve Neville, director of corporate marketing, Trend Micro Simpler is...
Continue reading
  0 Comments
0 Comments

Enterprise Security in the Era of Digital Transformation

Cybersecurity , Governance Stan Lowe of Zscaler on How CISOs Can Help Drive Revenue Growth Securely( @nickster2407 ) • March 25, 2019     Stan Lowe, global CISO at Zscaler Digital...
Continue reading
  0 Comments
0 Comments

AT&T Cybersecurity Sets Sights on Threat Intelligence

Cybersecurity , Next-Generation Technologies & Secure Development , Threat Intelligence Javvad Malik on New Entity's Role in Cybersecurity Market( SecurityEditor ) • March 25, 2019     Javvad Malik, security advocate...
Continue reading
  0 Comments
0 Comments

Inside Netscout's Threat Report

Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence Hardik Modi of Netscout Analyzes the Latest Cybercrime Trends( SecurityEditor ) • March 25, 2019     Hardik Modi is senior...
Continue reading
  0 Comments
0 Comments

Telegram Now Deletes Private Chats From Both Devices


screenshot-2019-03-25-at-10-44-30.png
Spyware 101: How to handle an infection scare Surveillance isn't just the purview of nation-states and government agencies -- sometimes, it is closer to home. To improve the privacy of the...
Continue reading
  0 Comments
0 Comments

Hackers Took Over Asus Updates To Send You Malware, Researchers Say

Asus Zephyrus GX531GS

An Asus laptop. Sarah Tew/CNET Thousands of Asus computers were infected with malware from the company's own update tool, researchers from Kaspersky Lab said Monday. The researchers discovered the attack in...
Continue reading
  0 Comments
0 Comments

Paper: Leaked Auth Secrets Rampant Across GitHub

An academic study of GitHub found that more than 100,000 of the web service’s code repositories contain publicly accessible authentication secrets such as API and cryptographic keys, while thousands of new...
Continue reading
  0 Comments
0 Comments