BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Research Firm Offers $3 Million for iOS, Android 0-Days

view counter
Vulnerability research firm Crowdfense has launched a new 0-day acquisition program and is promising payouts of up to $3 million for full-chain, previously unreported exploits.  Founded in 2017, the company says...
Continue reading
  0 Comments
0 Comments

Mark Zuckerberg Describes a New Privacy-Centric Facebook

view counter
2001 was not a good year for Microsoft. Its servers were ravaged by the Code Red and Nimda worms. In 2002, Bill Gates responded with his seminal 'security memo' to staff....
Continue reading
  0 Comments
0 Comments

Google Launches New Cloud Security Services

view counter
Google has introduced a new set of services to provide cloud customers with improved protection from unsafe websites, distributed denial of service (DDoS) attacks, and other threats. With the newly introduced...
Continue reading
  0 Comments
0 Comments

Many Vulnerabilities Discovered in Moxa Industrial Switches

Moxa IKS switches vulnerable to hacker attacks
view counter
Over a dozen vulnerabilities, including ones classified as critical, have been found by Positive Technologies researchers in EDS and IKS switches made by industrial networking solutions provider Moxa. The vendor has...
Continue reading
  0 Comments
0 Comments

Attack on Software Giant Citrix Attributed to Iranian Hackers

Resecurity's claims called into question
view counter
Software giant Citrix on Friday revealed that its internal network had been breached and the attackers may have stolen business documents. The company said it was informed by the FBI on...
Continue reading
  0 Comments
0 Comments

Venezuela's Maduro Says Cyber Attack Prevented Power Restoration

view counter
Venezuela President Nicolas Maduro claimed on Saturday that a new cyber attack had prevented authorities from restoring power throughout the country following a blackout on Thursday that caused chaos. Maduro told...
Continue reading
  0 Comments
0 Comments

A Compromise on Space Traffic Management

On June 18, 2018, President Trump signed Space Policy Directive 3, which established the first U.S. national policy on space traffic management (STM). SPD-3 laid out a concrete set of policy...
Continue reading
  0 Comments
0 Comments

Flaws in Smart Alarms Exposed Millions of Cars to Dangerous Hacking

view counter
Serious vulnerabilities found in high-end car alarms could have been exploited to remotely hack millions of vehicles, including to track them, immobilise them and spy on their owners. Researchers at UK-based...
Continue reading
  0 Comments
0 Comments

How China Exploits Social Media to Influence American Public

view counter
The growth of Russia's attempts to manipulate American public opinion since 2015 is well known and documented. At heart, it is basic political propaganda -- which is an accepted tool of...
Continue reading
  0 Comments
0 Comments

Slack, GitHub Abused by New SLUB Backdoor in Targeted Attacks

SLUB backdoor communications
view counter
Researchers from Trend Micro have come across a new piece of malware that abuses GitHub and Slack for command and control (C&C) communications. The malware is a backdoor that the security...
Continue reading
  0 Comments
0 Comments

Google Discloses Actively Exploited Windows Vulnerability

view counter
Google this week released information on a zero-day vulnerability in Windows being actively exploited in targeted attacks alongside a recently fixed Chrome flaw ( CVE-2019-5786 ). The Windows vulnerability has been...
Continue reading
  0 Comments
0 Comments

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Zerodium looking for Hyper-V and ESXi exploits
view counter
Exploit acquisition firm Zerodium this week announced that it’s prepared to pay up to $500,000 for VMware ESXi and Microsoft Hyper-V vulnerabilities. The company says it’s looking for ESXi (vSphere) and...
Continue reading
  0 Comments
0 Comments

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

A Minnesota man admitted Thursday that he hacked into state government databases in 2017 as an act of retaliation after the acquittal of an officer who fatally shot Philando Castile during...
Continue reading
  0 Comments
0 Comments

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

view counter
A Minnesota man admitted Thursday that he hacked into state government databases in 2017 as an act of retaliation after the acquittal of an officer who fatally shot Philando Castile during...
Continue reading
  0 Comments
0 Comments

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

SSL/TLS certificates offered for fraudulent e-commerce websites
SSL and TLS certificates and related services can be easily acquired from dark web marketplaces, according to an academic study sponsored by Venafi, a company specializing in the protection of cryptographic...
Continue reading
  0 Comments
0 Comments

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

SSL/TLS certificates offered for fraudulent e-commerce websites
view counter
SSL and TLS certificates and related services can be easily acquired from dark web marketplaces, according to an academic study sponsored by Venafi, a company specializing in the protection of cryptographic...
Continue reading
  0 Comments
0 Comments

Four Steps to Begin Better Managing Your Digital Risk

Four Steps Organizations Can Take to Begin Managing Their Digital Risk The emergence of Cyber Threat Intelligence (CTI) has given organizations valuable intelligence into a myriad of attacker behaviors. Armed with...
Continue reading
  0 Comments
0 Comments

Four Steps to Begin Better Managing Your Digital Risk

view counter
Four Steps Organizations Can Take to Begin Managing Their Digital Risk The emergence of Cyber Threat Intelligence (CTI) has given organizations valuable intelligence into a myriad of attacker behaviors. Armed with...
Continue reading
  0 Comments
0 Comments

Organizations Not Positioned for Success in Tackling Cyber Demands: Deloitte

Deloitte Logo
Report Shows Major Disconnect Between Cybersecurity and Cyber Everywhere in Digital Transformation In order to survive and thrive in the future, companies around the world are adopting digital transformation as part...
Continue reading
  0 Comments
0 Comments

Organizations Not Positioned for Success in Tackling Cyber Demands: Deloitte

Deloitte Logo
view counter
Report Shows Major Disconnect Between Cybersecurity and Cyber Everywhere in Digital Transformation In order to survive and thrive in the future, companies around the world are adopting digital transformation as part...
Continue reading
  0 Comments
0 Comments