BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Webinar Today: Managing Cyber Threats in the Era of Industry 4.0

image
Register Now
view counter
Presented by Industry 4.0 is delivering great benefits, as well as additional security risks, to industrial firms around the world. Often referred to as the fourth industrial revolution, Industry 4.0 environments...
Continue reading
  0 Comments
0 Comments

EU Fines Google for Anti-trust Breach

view counter
The EU's powerful anti-trust regulator slapped tech giant Google with a new fine on Wednesday over unfair competition, in Europe's latest salvo against Silicon Valley. In its third major decision against...
Continue reading
  0 Comments
0 Comments

Kaspersky Files Complaint Against Apple Over App Store Policy

view counter
Kaspersky Lab on Tuesday filed a complaint against Apple with the Russian Federal Antimonopoly Service after the tech giant introduced a new App Store policy requiring it to remove some important...
Continue reading
  0 Comments
0 Comments

SWF Welcomes Rob Ronci

SWF is pleased to announce that Rob Ronci is joining our team this month as a Commercial Space Research Assistant for a fixed-term this spring. Mr. Ronci will work with SWF...
Continue reading
  0 Comments
0 Comments

Industrial Cybersecurity Firm Nozomi Launches Research Department

view counter
Industrial cybersecurity solutions provider Nozomi Networks on Tuesday announced the formal launch of the company’s research department, Nozomi Networks Labs. While this is the formal launch of its research department, Nozomi...
Continue reading
  0 Comments
0 Comments

Cloudflare Launches New HTTPS Interception Detection Tools

view counter
Security services provider Cloudflare on Monday announced the release of two new tools related to HTTPS interception detection.  Occurring at times when the TLS connection between a browser and a server...
Continue reading
  0 Comments
0 Comments

Mobile App Security Firm Blue Cedar Raises $17 Million

view counter
Blue Cedar, a San Francisco-based company that specializes in securing mobile applications, on Tuesday announced that it raised $17 million in a Series B funding round. The funding round was led...
Continue reading
  0 Comments
0 Comments

Microsoft Dominates 2018's Most Exploited Vulnerabilities

view counter
Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products. Only one -- but the second most exploited -- was an Adobe vulnerability. The last one, ranking at...
Continue reading
  0 Comments
0 Comments

Researcher Finds Novel Bug Class in Windows Kernel

view counter
A security researcher working with Google Project Zero has discovered a novel bug class that impacts Windows and some of its drivers.  Discovered by James Forshaw, the issue resides in the...
Continue reading
  0 Comments
0 Comments

Aluminum Giant Norsk Hydro Hit by Ransomware

Aluminum giant Norsk Hydro hit by ransomware attack
LockerGoga ransom note
view counter
Norwegian metals and energy giant Norsk Hydro , one of the world’s biggest aluminum producers, has been hit by a ransomware attack that has impacted operations, forcing the company to resort...
Continue reading
  0 Comments
0 Comments

Norway's Norsk Hydro Hit by 'Extensive' Cyberattack

view counter
One of the world's biggest aluminium producers, Norway's Norsk Hydro, said Tuesday it had been hit by a cyber-attack of unknown origin. "Hydro became victim of an extensive cyberattack in the...
Continue reading
  0 Comments
0 Comments

From Traffic Cop to Fleet Manager, DLP Evolves Beyond the Perimeter

Data Leakage Prevention -  Enforcement
view counter
Perimeter-based DLP Enforcement Has Increasingly Taken a Backseat to Host-based Implementations Harkening back to a time before “cyber” entered a CISO’s daily vocabulary, data leakage prevention (DLP), even after two decades,...
Continue reading
  0 Comments
0 Comments

Google Open Sources Sandboxed API

Sandboxed API open source
view counter
Google on Monday announced that it has made available its Sandboxed API as open source in an effort to make it easier for software developers to create secure products. It’s not...
Continue reading
  0 Comments
0 Comments

New Mirai Variant Targets Enterprise IoT Devices

view counter
A recently discovered variant of the infamous Mirai botnet is targeting devices specifically intended for businesses, potentially signaling a focus toward enterprise.  Best known for the massive attacks on OVH and...
Continue reading
  0 Comments
0 Comments

Slack Introduces Enterprise Key Management Tool

view counter
Slack on Monday announced the introduction of Enterprise Key Management, an Enterprise Grid add-on feature that gives customers complete control over their encryption keys. Slack does encrypt data for all organizations,...
Continue reading
  0 Comments
0 Comments

'Shameless' Scammers Seek to Cash in on Christchurch Massacre

view counter
Scammers are trying to cash in on the Christchurch mosque massacres, using phishing emails with links to fake bank accounts to ensnare people keen to donate, New Zealand's cyber security body...
Continue reading
  0 Comments
0 Comments

Android Q Brings New Privacy and Security Features

view counter
Released in Beta 1 last week, the latest Android iteration (Android Q) arrived with new privacy protection improvements and other security enhancements.  Building on previously introduced features such as file-based encryption,...
Continue reading
  0 Comments
0 Comments

EU Adopts New Response Protocol for Major Cyberattacks

EU Law Enforcement Emergency Response Protocol
view counter
Europol on Monday announced the adoption of a new protocol for how law enforcement authorities in the European Union and beyond will respond to major cross-border cyberattacks. The new EU Law...
Continue reading
  0 Comments
0 Comments

Not All Context in Threat Intelligence is Created Equal

view counter
Context has always been a critical delineator in threat intelligence. It’s what distinguishes data from information, information from intelligence, and the meaningless from the meaningful. But while the importance of context...
Continue reading
  0 Comments
0 Comments

Chrome, Firefox Get Windows Defender Application Guard Extensions

view counter
Microsoft is extending the protection capabilities of Windows Defender Application Guard with the release of browser extensions for Chrome and Firefox.  The new extensions were designed to automatically redirect untrusted navigations...
Continue reading
  0 Comments
0 Comments