Hardcoded Backdoor Found on Western Digital Storage Devices

Firmware updates released by Western Digital for its MyCloud family of devices address a series of security issues, including a hardcoded backdoor admin account. The vulnerabilities were found in WDMyCloud...
Continue reading
0 Comments

Lawsuits Filed Against Intel Over CPU Vulnerabilities

At least three class action lawsuits have been filed against Intel in the past days over the recently disclosed vulnerabilities that could allow malicious hackers to obtain potentially sensitive information...
Continue reading
0 Comments

Serious Flaws Affect Dell EMC, VMware Data Protection Products

Data protection products from both Dell EMC and VMware are impacted by three potentially serious vulnerabilities discovered by researchers at Digital Defense. EMC told customers that its Avamar Server, NetWorker...
Continue reading
0 Comments

Qualcomm Working on Mitigations for Spectre, Meltdown

Qualcomm has confirmed that some of its products are affected by the recently disclosed Spectre and Meltdown vulnerabilities , but the company says mitigations are being deployed. The chipmaker has...
Continue reading
0 Comments

NSA Contractor Pleads Guilty in Embarrassing Leak Case

A former contractor for the US National Security Agency's elite hacking group has agreed to plead guilty to removing classified documents in a case that highlighted a series of disastrous...
Continue reading
0 Comments

US National Security Agency Chief to Retire

National Security Agency Director Admiral Mike Rogers, the US signals intelligence czar, plans to retire within months after a four-year term scarred by damaging leaks, US intelligence sources confirmed Friday....
Continue reading
0 Comments

ZeuS Variant Abuses Legitimate Developer’s Website

The official website of Ukraine-based accounting software developer Crystal Finance Millennium (CFM) was abused for the distribution of a variant of the ZeuS banking Trojan , Talos reports. The vector...
Continue reading
0 Comments

Ransomware Attacks Will Be More Devastating and Widespread

Ransomware Attacks Will Be More Devastating and Widespread Also: Outlook for Health Data Breaches, Other Cybersecurity Trends) • January 5, 2018     15 Minutes    An analysis of how unprepared...
Continue reading
0 Comments

2017 Security Transformation Study: Results Analysis

Bio Image
Bio Image
Bio Image
This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and...
Continue reading
0 Comments

Live Webinar: Let's Go Threat Hunting - Expert Tips for Enhancing Hunting in your Organization

Bio Image
You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

DHS Says 246,000 Employees' Personal Details Were Exposed

DHS Says 246,000 Employees' Personal Details Were Exposed
Data Breach , Governance , Incident Response 13 Years of Witness Statements to DHS Office of Inspector General Also Exposed( euroinfosec ) • January 5, 2018     The U.S....
Continue reading
0 Comments

Analysis: Security Elements of 'Trusted Exchange Framework'

Analysis: Security Elements of 'Trusted Exchange Framework'
Healthcare Information Exchange (HIE) , Privacy Some Proposals More Specific Than What's Required Under HIPAA( HealthInfoSec ) • January 5, 2018    Don Rucker, M.D., national coordinator for health IT...
Continue reading
0 Comments

Hackers Already Targeting Pyeongchang Olympics: Researchers

Hackers have already begun targeting the Pyeongchang Olympic Games with malware-infected emails which may be aimed at stealing passwords or financial information, researchers said Saturday. The security firm McAfee said...
Continue reading
0 Comments

Gifts and Data - Personalization Brings Meaning

The holidays are now behind us and we’re getting back to our routines. As we do, we start putting to use all the gifts we’ve received from family, friends, colleagues...
Continue reading
0 Comments

Microsoft Word subDoc Feature Allows Password Theft

A feature in Microsoft Word that allows for the loading of sub-documents from a master document can be abused by attackers to steal a user’s credentials, according to Rhino Security...
Continue reading
0 Comments

Several Vulnerabilities Patched in Advantech WebAccess

Taiwan-based industrial automation company Advantech has released an update for its WebAccess product to address several vulnerabilities, including ones rated high severity. Advantech WebAccess is a browser-based software package for...
Continue reading
0 Comments

Ubuntu Preps Patches for Meltdown, Spectre CPU Flaws

Ubuntu security updates planned for January 9 will patch the recently disclosed Meltdown and Spectre CPU vulnerabilties, Canonical has announced. Impacting billions of devices around the world, Meltdown and Spectre...
Continue reading
0 Comments

Industry Reactions to Meltdown, Spectre Attacks: Feedback Friday

Experts comment on the Meltdown and Spectre vulnerabilities
Researchers disclosed this week the details of two new attack methods allowing malicious actors to gain access to sensitive information stored in a device’s memory by exploiting security holes in...
Continue reading
0 Comments

Inside McAfee's Acquisition of Skyhigh Networks

McAfee Logo
McAfee Completes Acquisition of Skyhigh Networks On Jan. 3, McAfee completed the acquisition of Skyhigh Networks that was announced in November 2017. McAfee itself was spun out of Intel in...
Continue reading
0 Comments

Ransomware and Bitcoin Enter New Phase

The phenomenal appreciation in Bitcoin’s value against the dollar, up roughly 18x in 2017 and 4x since September, gives us pause to consider – from a security perspective – what...
Continue reading
0 Comments