Category: weekly summary

IT Security News Weekly Summary – Week 42

IT Security News Daily Summary 2021-10-24 TodayZoo phishing kit borrows the code from other kits 5 Security Concerns for Developers In Workload Protection Insights Into Proactive Threat Hunting Apple Says Notch is a ‘Smart Way’ to Give Users More Space…

IT Security News Weekly Summary – Week 41

IT Security News Daily Summary 2021-10-17 Application Modernization and Other Best Practices of Securing Legacy Infrastructures Is the Edge Really Secure? Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier? Microsoft October Patch…

IT Security News Weekly Summary – Week 40

IT Security News Daily Summary 2021-10-10 Data Exfiltration, Revisited Meet the Chapters Being Honored at the 2021 (ISC)² Global Achievement Awards (ISC)² Celebrates Cybersecurity Awareness Month With Treasure Trove of Knowledge Building Resources Introducing the Palo Alto Networks Panorama Advanced…

IT Security News Weekly Summary – Week 39

IT Security News Daily Summary 2021-10-03 Bug puts $162 million up for grabs, says founder of DeFi platform Compound SQL Cyber Attacks Are a Danger to Your Company TA544 group behind a spike in Ursnif malware campaigns targeting Italy $162…

IT Security News Weekly Summary – Week 38

IT Security News Daily Summary 2021-09-26 Online fraud causes confidence gap between customers and retailers, study finds The Importance of Adopting a Risk Management Approach to Security and Privacy Facebook Shareholders Are Suing Facebook For Protecting Zuckerberg In Data Probe…

IT Security News Weekly Summary – Week 37

IT Security News Daily Summary 2021-09-19 Epik – 15,003,961 breached accounts Here’s When You Can Download iOS 15 and iPadOS 15 in Time Zones Around the World Cyber EO and Meeting Cloud Modernization Effort iPhone 13 Orders Begin Shipping From…

IT Security News Weekly Summary – Week 36

IT Security News Daily Summary 2021-09-12 Zero-trust security could reduce cyber trust gap Google implements new Private Compute Services for Android 6 Reasons Why Companies Should Outsource Data Management Services What Is Zero Trust? It Depends What You Want to…

IT Security News Weekly Summary – Week 35

IT Security News Daily Summary 2021-09-05 Pacific City Bank hit by AVOS Locker Ransomware Five Myths About NATO and Afghanistan The common vulnerabilities leaving industrial systems open to attack Researchers: Thousands Of Facebook Posts Around January 6 Riots Are Missing…

IT Security News Weekly Summary – Week 34

IT Security News Daily Summary 2021-08-29 T-Mobile hacker used brute force attack to steal customers’ data Forrester: Why APIs need zero-trust security Thinking about CAP or CISSP? Here’s How They Compare. Kuo: iPhone 13 to Feature LEO Satellite Communications to…

IT Security News Weekly Summary – Week 33

IT Security News Daily Summary 2021-08-22 Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G Four Ways Smart Cities Can Stay Safe in An…

IT Security News Weekly Summary – Week 31

IT Security News Daily Summary 2021-08-08 1M compromised cards available for free in the underground market Apple Engineers Reportedly Pessimistic About Apple’s Living Room Hardware Strategy Black Hat USA 2021 & DEF CON 29 Highlights & Key Takeaways> Security BSides…

IT Security News Weekly Summary – Week 30

IT Security News Daily Summary 2021-08-01 D-BOX Technologies Confirms Recovery Following Ransomware Attack Solarmarker Malware Emerges As A Potent InfoStealer And Keylogger Security BSides Athens 2021 – Talk 1: Erfan Fazeli’s ‘Blockchain Basics And Security For Penetration Testers’ Ransomware Attempt…

IT Security News Weekly Summary – Week 29

IT Security News Daily Summary 2021-07-25 Threat actor offers Clubhouse secret database containing 3.8B phone numbers Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 339’ BSides Vancouver 2021 – Christian Miles’ ‘Attack Of The Graph: Visual Tools…

IT Security News Weekly Summary – Week 27

IT Security News Daily Summary 2021-07-11 How can you protect your personal, sensitive data online? BSidesNoVA 2021 – Filipi Pires’ ‘Discovering C&C In Malicious PDF’ XKCD ‘Nightmare Code’ BSidesNoVA 2021 – Kyle Fiducia’s, Chris Gates’, Bob Weiss’, Nick Ippolito’s &…

IT Security News Weekly Summary – Week 26

IT Security News Daily Summary 2021-07-04 DIY CD/DVD Destruction – Follow Up, (Sun, Jul 4th) What Happened in the Kaseya VSA Incident? After Ransomware Attack AJG US Reported Data Breach CISA-FBI Guidance for MSPs and their Customers Affected by the…

IT Security News Weekly Summary – Week 25

IT Security News Daily Summary 2021-06-27 DIY CD/DVD Destruction, (Sun, Jun 27th) How the United States Can Compete with Chinese Influence in Southeast Asia NOBELIUM Hackers Gain Access To The Microsoft Networks via Hacked Employee Computer The Case for Open…

IT Security News Weekly Summary – Week 24

IT Security News Daily Summary 2021-06-20 Multilingual Cybersecurity Awareness Training adapted for your needs Penetration testing IT Security News Daily Summary 2021-06-19 ‘Build’ or ‘Buy’ your own antivirus product IT Security News Daily Summary 2021-06-18 Ransomware Actors Evolved Their Operations…

IT Security News Weekly Summary – Week 23

IT Security News Daily Summary 2021-06-13 Frequent run-ins with Indian government complicates tech giants’ plans BackdoorDiplomacy APT targets diplomats from Africa and the Middle East Security BSides Dublin 2021 – Rob Slade’s ‘Homomorphic Encryption’ The Joy of Tech® ‘Jeff Bezos…

IT Security News Weekly Summary – Week 22

IT Security News Daily Summary 2021-06-06 Machine learning security needs new perspectives and incentives Facebook Will End Special Content Moderation Treatment For Politicians Google Chrome 91 Will Alert Users About Untrusted Browser Extensions Packet Captures in the Age of TLS…

IT Security News Weekly Summary – Week 21

IT Security News Daily Summary 2021-05-30 Lest We Forget, All Gave Some, Some Gave All Memorial Day Weekend Plans? BSides Canberra 2021 – Sean Yeoh’s, Patrick Mortensen’s, Michael Gianarakis’ And Shubham Shah’s ‘Context Aware Content Discovery: The Natural Evolution’ Video:…

IT Security News Weekly Summary – Week 20

IT Security News Daily Summary 2021-05-23 VR scenarios help DHS research arrest-related fatalities The future of government service delivery is already here CPDP 2021 – Moderator: Sophie in ‘t Veld ‘I Spy With My Little Eye…’ XKCD ‘In Your Classroom’…

IT Security News Weekly Summary – Week 19

IT Security News Daily Summary 2021-05-16 Experts Call For Facebook To Be Broken Up After WhatsApp Privacy Update Avaddon ransomware gang: ‘We stole 3TB of French AXA Group data’ Avaddon ransomware gang says it stole 3TB of French AXA Group…

IT Security News Weekly Summary – Week 18

IT Security News Daily Summary 2021-05-09 Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’ CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’ WhatsApp is reportedly working on web version without connected phone…

IT Security News Weekly Summary – Week 17

IT Security News Daily Summary 2021-05-02 Facebook and Instagram Asks Users to Enable ATT Tracking In Order to Keep Services ‘Free of Charge’ CPDP 2021 – Moderator: Brent R. Homan ‘When Regulatory Worlds Collide – The Intersection Of Privacy, Competition…

IT Security News Weekly Summary – Week 16

IT Security News Daily Summary 2021-04-25 Biden’s Asia-Pacific Rebalancing Push CISA warns of credential theft via SolarWinds and PulseSecure VPN Take A Moment To Hug Your Friends & Family, RIP Dan Kaminsky Here’s When You Can Likely Download iOS 14.5…

IT Security News Weekly Summary – Week 15

IT Security News Daily Summary 2021-04-18 WhatsApp Pink is malware spreading through group chats Here’s a Quick Look at How Pakistani Counterfeiters Helped Russian Operatives Monero Cryptocurrency campaign exploits ProxyLogon flaws Belfast Tinderbox: Why Loyalists Are in the Streets This…

IT Security News Weekly Summary – Week 14

IT Security News Daily Summary 2021-04-11 Apple Agrees to Provide Executive to Testify At Upcoming App Store Senate Hearing Iran Calls Natanz Atomic Site Blackout ‘Nuclear Terrorism’ XKCD ‘Eradication’ BSides Philly 2020 – Christopher Lopez’ ‘Asking Questions And Writing Effectively’…

IT Security News Weekly Summary – Week 13

IT Security News Daily Summary 2021-04-04 YARA and CyberChef: ZIP, (Sun, Apr 4th) Alleged iPhone 13 Pro Mockup Shows Smaller Notch, Repositioned Earpiece and Front Camera Ubiquiti All But Confirms Breach Response Iniquity CERIAS – Levi Lloyd’s ‘Securing The Software…

IT Security News Weekly Summary – Week 12

IT Security News Daily Summary 2021-03-28 Experts found two flaws in Facebook for WordPress Plugin TCPView v4.0 Released, (Sun, Mar 28th) The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’ Experts: Facebook Oversight Board Not Enough…

IT Security News Weekly Summary – Week 11

IT Security News Daily Summary 2021-03-21 New malware “BlackRock” disguised as Android Clubhouse app USENIX Enigma 2021 – Julian Rrushi’s ‘A Quest For The Physics Of Cyberspace’ USENIX Enigma 2021 – Gianluca Stringhini’s ‘Computational Methods To Understand And Mitigate Online…

IT Security News Weekly Summary – Week 10

IT Security News Daily Summary 2021-03-14 Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’ BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’ Upcoming Speaking Engagements BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An…

IT Security News Weekly Summary – Week 09

IT Security News Daily Summary 2021-03-07 John McAfee Charged with Fraud in Cryptocurrency Scam BSides Calgary 2020 -Scott Taylor’s ‘Exploring Common Hacking Techniques’ Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’ Chinese hackers allegedly hit thousands…

IT Security News Weekly Summary – Week 08

IT Security News Daily Summary 2021-02-28 BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ Robert M. Lee’s & Jeff Haas’ Little Bobby Comics…

IT Security News Weekly Summary – Week 07

IT Security News Daily Summary 2021-02-21 BSidesSF 2020 – Yu-Jye Tung’s ‘An Effective Approach To Software Obfuscation’ Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 317’ BSidesSF 2020 – Atul Gaikwad’s & Moses Schwartz’ ‘Mistakes Made Integrating…

IT Security News Weekly Summary – Week 06

IT Security News Daily Summary 2021-02-14 Data Risk, Intelligence and Insider Threats Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 316’ BSidesSF 2020 – Daniel Tobin’s & Paul Karayan’s ‘From Cockroaches To Marble Floors’ AustCyber merges with…

IT Security News Weekly Summary – Week 04

IT Security News Daily Summary 2021-01-31 Exabeam joins cybersecurity ecosystem revolving around Snowflake Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 314’ BSidesSF 2020 – Ari Eitan’s ‘Mapping The Connections Inside Russia’s APT Ecosystem’ Microsoft patent reveals…

IT Security News Weekly Summary – Week 02

IT Security News Daily Summary 2021-01-17 DEF CON 28 Safe Mode IoT Village – Deral Heiland’s NAND Flash Recovering File Systems’ Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 312’ DEF CON 28 Safe Mode IoT Village…

IT Security News Weekly Summary – Week 01

IT Security News Daily Summary 2021-01-10 It is time to re-evaluate Cyber-defence solutions DEF CON 28 Safe Mode Lock Picking Village – Jared Dygart’s ‘Safecracking For Everyone’ Apple and Hyundai to Sign Apple Car Deal by March With Production Beginning…

IT Security News Weekly Summary – Week 53

IT Security News Daily Summary 2021-01-03 DEF CON 28 Safe Mode Saturday – Patrick Kiley’s ‘Reverse Engineering A Tesla Battery Mgmt. System For Moar Power’ Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – From The Archive – ‘WEEK…

IT Security News Weekly Summary – Week 52

IT Security News Daily Summary 2020-12-27 Samsung and Xiaomi Plan to Ship Upcoming Smartphones Without Charger After Mocking Apple Over Same Move Livecoin Cryptocurrency Exchange Hacked Losing Control Of All Servers Surveillance Self-Defense and Security Education: Year in Review 2020…

IT Security News Weekly Summary – Week 51

IT Security News Daily Summary 2020-12-20 Ledger – 1,075,241 breached accounts Ledger data breach: Hacker leaks stolen database on hacker forum Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 308’ DEF CON 28 Safe Mode Blockchain Village…

IT Security News Weekly Summary – Week 50

IT Security News Daily Summary 2020-12-13 Pay2Key hackers stole data from Intel’s Habana Labs Steam vulnerabilities allowed remote take over of users’ computers Third parties: The Risk Management Blind Spot The Comforting… DEF CON 28 Safe Mode Aerospace Village –…

IT Security News Weekly Summary – Week 49

IT Security News Daily Summary 2020-12-06 iOS 14.2 Reportedly Causing Severe Battery Drain Cloudflare WAF Bypass Via Padding Technique Discovered DEF CON 28 Safe Mode Aerospace Village – Alex Lomas’ ‘Introduction To ACARS’ The Joy of Tech® ‘After The Vaccine’…

IT Security News Weekly Summary – Week 48

IT Security News Daily Summary 2020-11-29 Advantech Suffered Conti Ransomware Attack – Hackers Demand 750 BTC Ransom Gaming Tech 101: What Every Beginner Gamer Needs How to Download High Quality Music to Your PC How to Protect Your Dispatch Software…

IT Security News Weekly Summary – Week 47

IT Security News Daily Summary 2020-11-22 DEF CON 28 Safe Mode Voting Village Village -Jody Westby’s ‘Policy Approach To Resolving Cybersecurity Problems’ DEF CON 28 Safe Mode Voting Village Village – Stark Xie’s ‘Testing Can’t Tell If Ballot Devices Alter…

IT Security News Weekly Summary – Week 46

IT Security News Daily Summary 2020-11-15 How to address inefficiencies of using multiple cybersecurity systems Federal panel sides with VA on union contract Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 303’ DEF CON 28 Safe Mode…

IT Security News Weekly Summary – Week 45

IT Security News Daily Summary 2020-11-08 Hackers work 24 hours a day – when will you schedule your security training? Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 302’ DEF CON 28 Safe Mode ICS Village –…

IT Security News Weekly Summary – Week 44

IT Security News Daily Summary 2020-11-01 University of Vermont Health Network Suffers Cyberattack, Six Hospitals Affected BitCode – Blockchain for HTTP Lambda Invocations Nuclear Regulation Authority shut down email systems after a cyber attack Passwarden – The Easy and Secure…

IT Security News Weekly Summary – Week 42

IT Security News Daily Summary 2020-10-18 Group warns of gaps in election infrastructure Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 299’ DEF CON 28 Safe Mode AppSec Village – Fredrick “Flee” Lee’s ‘What Bruce Lee Can…

IT Security News Weekly Summary – Week 42

IT Security News Daily Summary 2020-10-12 Apple T2 Chip Security Vulnerability turns serious Secure Your In-Home IoT | Avast Ransomware: How to Avoid the Dangerous Wave of Attacks Cloudflare Launches New Zero Trust Networking, Security Platform Cybersecurity budget relies on…

IT Security News Weekly Summary – Week 15

Unclassified and Secure BSidesSF 2020 – Georgios Kapoglis’ ‘Fantastic AWS Attacks And Where To Find Them’ Registry Analysis XKCD ‘Thermometer’ What is Active Directory Integration (ADI)? 10 tips for working remotely Could WORM Help Build Local Gov’t Resilience to Ransomware?…

IT Security News Weekly Summary – Week 14

IT Security News Daily Summary 2020-04-05 New Microsoft Edge features will make you more productive Maldoc XLS Invoice with Excel 4 Macros, (Sun, Apr 5th) Firefox zero day in the wild: patch now! Popular OGUsers hacking forum breached for the…

IT Security News Weekly Summary – Week 13

Shmoocon 2020 – Josh Kamdjou’s ‘Voight-Kampff for Email Addresses: Quantifying Email Address Reputation To Identify Spear-Phishing And Fraud’ Seemingly Unreleased Version of Logic Pro X With Live Loops Appears on Apple’s Education Site [Updated] Fine-tuning innovation to meet COVID challenges…

IT Security News Weekly Summary – Week 12

IT Security News Daily Summary 2020-03-22 Apple Shares New Support Document Addressing Distorted Screen Issue on Macs Running Windows 10 Cisco Addressed Multiple High-Risk Vulnerabilities In SD-WAN Solution Keepnet Labs accidentally exposed an unprotected database with 5 Billion previously leaked…

IT Security News Weekly Summary – Week 11

IT Security News Daily Summary 2020-03-15 Eliminate Identity Silos from Azure AD Coronavirus Guidance from Our Nation’s Governors and State CIOs Folding@Home Now Has 23 Coronavirus Projects, Donate CPU Power! DEF CON 27 Monero Village – Sarang Noether PhD’ ‘If…

IT Security News Weekly Summary – Week 10

IT Security News Daily Summary 2020-03-08 Directory Users and Computers Reporting Tim Cook Offers Work From Home to Most Apple Staff Amid Coronavirus Concerns The City of Durham shut down its network after Ryuk Ransomware attack DEF CON 27, Packet…

IT Security News Weekly Summary – Week 08

IT Security News Daily Summary 2020-02-23 DEF CON 27, Artificial Intelligence Village – Jesus Solano’s ‘Behavioral Biometrics And Context Analytics’ From The Archive: Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 105’ DEF CON 27, Artificial Intelligence…

IT Security News Weekly Summary – Week 06

IT Security News Daily Summary 2020-02-09 Kuo Warns of Delays and Low Labor Return Rates at Apple Supplier Factories in China Due to Coronavirus Everything You Need to Know About the Apple Pencil Emergency call service in Australia to use…

IT Security News Weekly Summary – Week 05

IT Security News Daily Summary 2020-02-02 DEF CON 27, Voting Village – Brian Varner’s ‘Beyond the Voting Machine: Other High Value Targets’ The Joy of Tech® ‘Facebook, the Game!’ Cyber Security Roundup for February 2020 DEF CON 27, Recon Village…

IT Security News Weekly Summary – Week 04

IT Security News Daily Summary 2020-01-26 XKCD ‘Networking Problems’ DEF CON 27, Voting Village – Kartikeya Kandula’s ‘Unclear Ballot Automated Ballot Image Manipulation’ DEF CON 27, Voting Village – Joseph Marks’ Panel Discussion Universal Directory Replacement Mary Davie: Exit interview…

IT Security News Weekly Summary – Week 03

IT Security News Daily Summary 2020-01-19 End-to-end encryption means Huawei bans are about availability, not interception New Nest Video Extortion Scam Plays Out Like a Spy Game Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0 DEF CON 27,…

IT Security News Weekly Summary – Week 02

IT Security News Daily Summary 2020-01-12 New Bill prohibits intelligence sharing with countries using Huawei 5G equipment Sodinokibi Ransomware threats Travelex to release data, if ransom not paid. One More Threat For Organizations – The Ako Ransomware MageCart attack hit…

IT Security News Weekly Summary – Week 01

IT Security News Daily Summary 2020-01-05 Kali Linux Announced New Kali 2020.1 Comes With “Non-Root Users By Default” US Restaurant Chain Landry Discloses POS Malware Attack 5 Best Cybersecurity Practices for Your Offshore Development Team Austria’s foreign ministry is facing…