New TelegramRAT Exploits Recently Patched Office Vulnerability

A recently discovered Remote Access Trojan (RAT) is being distributed via documents that exploit a 17-year old Office vulnerability patched in November 2017, Netskope warns. Dubbed TelegramRAT, the malware leverages...
Continue reading
0 Comments

Cambium Wireless Networking Devices Vulnerable to Attacks

A researcher has discovered nearly a dozen security issues in ePMP and cnPilot wireless networking products from Cambium, including vulnerabilities that can be exploited to take control of devices and...
Continue reading
0 Comments

ICS Cyber Security Predictions for 2018 - The Bad, The Ugly, and The Good

Next year will present new and increasing industrial cyber security challenges for facilities operators. However, there’s good news also. New developments will help minimize those threats.  On the bad front,...
Continue reading
0 Comments

U.S. Declares North Korea Led Huge WannaCry Cyberattack

The United States officially accused North Korea late Monday of carrying out the massive WannaCry attack that infected some 300,000 computers in 150 countries earlier this year. North Korea was...
Continue reading
0 Comments

South Korea Cryptocurrency Exchange Shuts Down After Hacking

A South Korean exchange trading bitcoin and other virtual currencies declared itself bankrupt on Tuesday after being hacked for the second time this year, highlighting the risk over cryptocurrencies as...
Continue reading
0 Comments

Australia Police Accidentally Broadcast Arrest Plans on Social Media

Australian police accidentally broadcast on social media details of an operation to arrest a suspected North Korean agent -- three days before he was taken into custody, media reported Wednesday....
Continue reading
0 Comments

Google Researcher Finds Critical Flaw in Keeper Password Manager

Tavis Ormandy finds critical vulnerability in Keeper password manager
Google Project Zero researcher Tavis Ormandy recently discovered that the Keeper password manager had been affected by a critical flaw similar to one he identified just over one year ago...
Continue reading
0 Comments

vBulletin to Patch Disclosed Code Execution, File Deletion Flaws

The details of two potentially serious vulnerabilities affecting version 5 of the vBulletin forum software were disclosed by researchers last week. The flaws are currently unpatched, but vBulletin developers have...
Continue reading
0 Comments

French Aerospace Giant Thales Acquires SIM Maker Gemalto

French aerospace and defence group Thales said Sunday it has bought European SIM manufacturer Gemalto in a bid to become a global leader in digital security. The aerospace giant paid...
Continue reading
0 Comments

Microsoft Disables Dynamic Update Exchange Protocol in Word

In an attempt to prevent cybercriminals from abusing the Dynamic Update Exchange protocol (DDE) for nefarious operations, Microsoft has disabled the feature in all supported versions of Word. The DDE...
Continue reading
0 Comments

Report: Uber Paid Florida 20-Year-Old $100,000 Over Hack

Report: Uber Paid Florida 20-Year-Old $100,000 Over Hack
image
image
Report: Uber Paid Florida 20-Year-Old $100,000 Over Hack Takeaway: 'Bug Bounty' Plus NDA Still Looks Like Hush Money( euroinfosec ) • December 7, 2017    Photo: Andrew Caballero-Reynolds/AFP/Getty Images The...
Continue reading
0 Comments

Don't Be a Money Mule for the Holidays

Don't Be a Money Mule for the Holidays
image
image
Fraud , Risk Management Don't Be a Money Mule for the Holidays Cybercrime Money-Transfer Schemes Increasingly Involve Cryptocurrency( euroinfosec ) • December 10, 2017    Photo: Mangrove Mike , via...
Continue reading
0 Comments

DHS Cybersecurity Agency Could Get a New Name and a Revamp

DHS Cybersecurity Agency Could Get a New Name and a Revamp
Cybersecurity , Legislation DHS Cybersecurity Agency Could Get a New Name and a Revamp National Protection and Programs Directorate Title Fails to Describe Its Purpose( GovInfoSecurity ) • December 13,...
Continue reading
0 Comments

Do You Have a Dark Endpoint Problem?

Do You Have a Dark Endpoint Problem?
Anti-Malware , Cybersecurity , Data Breach Do You Have a Dark Endpoint Problem? Endpoint Continues To Be a Thorn in People's Sides• December 13, 2017     Endpoint blind spots...
Continue reading
0 Comments

GDPR: Distinguishing Fact From Fiction

GDPR: Distinguishing Fact From Fiction European Cybersecurity Expert Sorts Through the Confusion) • December 15, 2017     10 Minutes    With just a few months left until the EU's General...
Continue reading
0 Comments

Significant Changes Coming to NIST Cybersecurity Framework

Significant Changes Coming to NIST Cybersecurity Framework Version 1.1 Emphasizes Stronger Integration Tying Cybersecurity to Business Processes) • December 12, 2017     10 Minutes    The latest ISMG Security Report...
Continue reading
0 Comments

Critical Components of an Insider Threat Mitigation Program

Critical Components of an Insider Threat Mitigation Program Brandon Swafford of Forcepoint on an 'Inside-Out' Approach) • December 12, 2017     15 Minutes    Organizations should take an "inside-out" approach...
Continue reading
0 Comments

How Malware Known as Triton Threatens Public Safety

How Malware Known as Triton Threatens Public Safety Also, Giving DHS's Cybersecurity Unit a Meaningful Name) • December 15, 2017     10 Minutes    The latest ISMG Security Report leads...
Continue reading
0 Comments

The Key Tenets and Timeframe for PSD2 Implementation

Bio Image
You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

NY DFS Cybersecurity Regulation: A Compliance Guide for Financial Institutions

NY DFS Cybersecurity Regulation: A Compliance Guide for Financial Institutions
Anti-Fraud , Anti-Malware , Application Security NY DFS Cybersecurity Regulation: A Compliance Guide for Financial Institutions Presented by Okta, Inc.     60 minutes     The New York state...
Continue reading
0 Comments