Fastbooking Hack Leaves Japan Hotel Red-Faced

A Japanese hotel chain has apologised after more than 120,000 items of customer information were stolen in hacks of its reservations handled by French company Fastbooking. Prince Hotel, a major...
Continue reading
0 Comments

Ping Identity Acquires API Security Firm Elastic Beam

Identity management solutions provider Ping Identity on Tuesday announced the acquisition of Elastic Beam, a company that specializes in detecting and blocking attacks aimed at application programming interfaces (APIs). Ping...
Continue reading
0 Comments

Unpatched WordPress Flaw Leads to Site Takeover, Code Execution

A file deletion vulnerability that remains unpatched 7 months after being reported allows for the complete takeover of WordPress sites and for arbitrary code execution. The security flaw supposedly impacts...
Continue reading
0 Comments

House Passes Bill to Enhance Industrial Cybersecurity

House passes legislation aimed at strengthening industrial cybersecurity
The U.S. House of Representatives on Monday passed a bill aimed at protecting industrial control systems (ICS), particularly ones used in critical infrastructure, against cyberattacks. The legislation, H.R. 5733 ,...
Continue reading
0 Comments

Cisco ASA Flaw Exploited in DoS Attacks

Cisco ASA vulnerability exploited in the wild
Cisco has informed users that a recently patched vulnerability affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software has been exploited in denial-of-service (DoS) attacks. The vulnerability,...
Continue reading
0 Comments

Toxic Content, Insider Threats Lurk in Business Collaboration Tools: Report

A new report quantifies what every manager instinctively knows: private messaging within collaboration tools can hide worrying content sent between employees. This can include confidential and sensitive data inappropriately shared,...
Continue reading
0 Comments

RANCOR Cyber Espionage Group Uncovered

A cyber espionage group that has remained undetected until recently, has been targeting South East Asia with two previously unknown malware families, according to Palo Alto Networks. The group, referred...
Continue reading
0 Comments

EFF Secures Email Delivery With STARTTLS Everywhere

The Electronic Frontier Foundation (EFF) this week announced STARTTLS Everywhere, a new project aimed at improving the security of email delivery. The EFF is already involved in initiatives aimed at...
Continue reading
0 Comments

Sophos Patches Privilege Escalation Flaws in SafeGuard Products

Researchers discovered several vulnerabilities in Sophos SafeGuard full-disk and file encryption products. The flaws allow an attacker to escalate privileges on a compromised device and execute arbitrary code with SYSTEM...
Continue reading
0 Comments

Data Protection Firm BigID Raises $30 Million

BigID, a company that specializes in helping organizations protect customer data and comply with privacy regulations, on Monday announced that it raised $30 million in a Series B funding round....
Continue reading
0 Comments

Security Startup Quantum Xchange Promises Unbreakable Quantum-Safe Encryption

Quantum Xchange
Quantum Xchange Raises $10 Million, Launches Quantum Key Distribution Service Bethesda, MD-based start-up Quantum Xchange  has announced $10 Million Series A funding from New Technology Ventures, and the launch of...
Continue reading
0 Comments

Eight Arrested for Roles in Email Fraud Schemes

Eight individuals were arrested for their roles in a widespread, Africa-based business email compromise (BEC) conspiracy, the United States Department of Justice announced on Monday. Following operation WireWire earlier this...
Continue reading
0 Comments

Window Snyder Joins Intel as Chief Software Security Officer

Window Snyder joins Intel
Window Snyder
Intel on Monday announced that Window Snyder has joined the company’s Software and Services Group as chief software security officer, vice president and general manager of the Intel Platform Security...
Continue reading
0 Comments

FireEye Denies Hacking Back Against Chinese Cyberspies

FireEye says it does not hack back
Experts discuss FireEye hack back claims
In his latest book, New York Times correspondent David Sanger describes how cybersecurity firm Mandiant hacked into the devices of Chinese cyberspies during its investigation into the threat group known...
Continue reading
0 Comments

Australia's HealthEngine Caught in Data-Sharing Fiasco

Australia's HealthEngine Caught in Data-Sharing Fiasco
image
image
Privacy Medical Appointment Booking Platform Says It Obtains Consent( jeremy_kirk ) • June 25, 2018    HealthEngine's mobile app Australia largest medical booking platform, HealthEngine, shared private medical data with...
Continue reading
0 Comments

Supreme Court Rules on Mobile Location Data: Get a Warrant

Supreme Court Rules on Mobile Location Data: Get a Warrant
Privacy ACLU Says Decision 'Provides a Groundbreaking Update to Privacy Rights'( euroinfosec ) • June 25, 2018     The U.S. Supreme Court on Friday ruled that data generated by...
Continue reading
0 Comments

Wi-Fi Alliance Launches WPA3 Security Standard

Wi-Fi Alliance launches WPA3
The Wi-Fi Alliance, the non-profit organization whose global network of members maintains Wi-Fi technology, announced late on Monday the launch of the WPA3 security standard. Unveiled in January, the latest...
Continue reading
0 Comments

Necurs Campaign Uses Internet Query File Attachments

The Necurs botnet has been using Internet Query (IQY) files in recent waves of spam attacks in an effort to thwart security protections. Active since at least 2012 and currently...
Continue reading
0 Comments

EU States to Form 'Rapid Response' Cyber Force: Lithuania

Nine European Union states are to create rapid response teams to counter cyber attacks within the framework of a new EU defence pact, project leader Lithuania announced on Thursday. "Nine...
Continue reading
0 Comments

Industrial IoT: Protecting the Physical World from Cyber Attacks

The convergence of industrial IoT and intelligent automation has been a boon for many enterprises, allowing machines to take on tasks that previous generations of automation could not handle. This...
Continue reading
0 Comments