Body as biosensor: Faster COVID detection boosts military readiness
Ransomware attack discrupts Metro Vancouver’s payment systems
Recently disclosed CVE-2020-4006 VMware zero-day was reported by NSA
The 2020 Workshop on Economics and Information Security (WEIS)
Dutch Antitrust Probe Targets Contactless Payments Like Apple Pay
Cyber czar, CISA subpoenas included in must-pass defense bill
MacRumors Giveaway: Win a Pad X3 Wireless Charger from WhyWood
Trickbot Added New Feature to Infect UEFI/BIOS and Survive OS Reinstall
Verifying Linux Server Security: What Every Admin Needs to Know>
New law enshrines modernization Centers of Excellence effort
Most used passwords for 2020: The internet’s favorite curse word, name, food, and team
VMware Patches Workspace ONE Access Vulnerability Reported by NSA
Italian Police Arrest Criminals Accused of Robbing ATMs with Purpose-Built Black Boxes
Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely
Apple Confirms Family Sharing for In-App Purchases and Subscriptions is Now Available
Hack-for-Hire Group ‘DeathStalker’ Uses New Backdoor in Recent Attacks
Why Workers Aren’t Confident in their Companies’ Security (and What to Do About it)
Entisys360 Receives NetApp Americas HCI Innovation Award 2020
NSA warns of Russian state-sponsored hackers exploiting VMWare vulnerability
Protect your business from DDoS attacks: Join this webinar to find out more
Report: Despite Being Shut Down, Fraudulent Ad System Continues Scamming Facebook Users
Satechi Debuts Magnetic Wireless Charger for iPhone 12 Models
Phishing hosted on high Alexa domains: another dangerous trick in Web
Stop Streaming In Ultra HD On Phones To Save Planet, Scientists Warn
Iranian Hackers Access Unprotected ICS at Israeli Water Facility
Islamic imprisoned hacker Ardit Ferizi ordered to be deported
Brazilian Aerospace And Defence Group Embraer’s Systems Affected By Cyberattack
Many Android Apps Expose Users to Attacks Due to Failure to Patch Google Library
Flash Dies but Warning Signs Persist: A Eulogy for Tech’s Terrible Security Precedent
Tibet and Taiwan Targeted in Spearphishing Campaigns Using MESSAGEMANIFOLD Malware
Google Illegally Spied On And Retaliated Against Workers, Feds Say
CBP’s Warrantless Use Of Cell Location Data Is Under Investigation
Metro Vancouver Transportation Agency TransLink Hit by Ransomware
Hackers hiding skimming malware behind social media sharing icons
US Intelligence Director Says China is Top Threat to America
#WebSummit: Nick Clegg Claims Internet Needs Accountability, Not Rules
Verizon Leaks Customer Conversations, Personal Data Through Flawed Chat Window on Its Website
Hundreds of millions of Android users exposed to hack due to CVE-2020-8913
Data Protection Is Integral In Wake Of COVID-19 Vaccine ‘Cold Supply’ Chain Network Hack
Security Expert Re: Absa Financial Services Employee Sells Customer Data To Third Parties
Heimdal Security Announces Opening of Its Second Office in the UK
Google Hacker Found a Way to Hack iPhones Remotely Through WiFi
The biggest data breach fines, penalties and settlements so far
40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?
Scammers stole millions last Christmas. These six tips could keep you safe online this time around
Ransomware Operators Phone Victims to Announce They’ve Been Hacked
Metro Vancouver TransLink hit by Egregor ransomware attack, travellers disrupted
Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace
Warner Bros 2021 Movies to Debut in Theater and on HBO Max at Same Time
FTC Warns of Recent Surge in Robocall Scammers Pretending to Be Apple
Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution
Twitter Ends Threaded Conversations Tests After Negative User Feedback
Ransomware attack cripples Vancouver public transportation agency
Hackers-For-Hire Group Develops New ‘PowerPepper’ In-Memory Malware
How Organizations Can Prevent Users from Using Breached Passwords
Want your endpoint security product in the ‘Microsoft Consumer Antivirus Providers for Windows’ ?
Intelligence review recommends new electronic surveillance Act for Australia
ControlFlag: Machine programming research tool detects bugs in code
December 2020 Patch Tuesday forecast: Always consider the risk
Google Discloses a zero-click Wi-Fi Exploit to Hack iPhone Devices
TikTok saga will ultimately reach a ‘peaceful resolution’: Jefferies analyst
How to enhance onboarding for digital banking services using risk management
Fashion Forward: how technology is reshaping the fashion industry
Stories from the SOC – Multi-layered defense detects Windows Trojan
Consumers would like to view internet connectivity as a trusted utility
Growth of cloud-native apps and containerization to define 2021
2020-12-03 – TA551 (Shathak) Word docs with Italian template send Ursnif (Gozi/ISFB) with Pushdo
Cybersecurity Trends 2021: Staying secure in uncertain times
Updated Malware: Vietnamese Hacking Group Targeting MacOS Users
StoneOS 5.5R8: Helping enterprises defend all their network entry points
Covid-related phishing is a ‘very serious attack on humanity’: Barracuda Networks
Solving the Recurring Collection and Time Tradecraft Issues in Online Investigations
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)
(ISC)² adds new cybersecurity courses to its Professional Development Institute portfolio
Veeam Backup for Microsoft Office 365: Purpose-built backup and recovery for Teams
Two cybersecurity hygiene actions to improve your digital life in 2021
Authentic8 expands availability of Silo across Google Cloud’s infrastructure
Thales launches double-sided ID card reader to simplify the ID verification process
Exoprise CloudReady now available in the Microsoft Azure Marketplace
Governor Cuomo: Keep Police and ICE Away from Our Contact Tracing Data
Edward Snowden asks Trump to pardon Wikileaks founder Julian Assange
Okta expands deployments for Canadian Western Bank, First National of Nebraska, and Nota
DXC Technology and Microsoft help companies address rapidly evolving business challenges
Deloitte and AWS Professional Services drive customer cloud migration and app modernization
Hackers are launching cyberattacks targeting Covid vaccine supply chain
Zoom CEO Eric Yuan on the challenges of adapting an enterprise product for consumers
Potential Nation-State Actor Targets COVID-19 Vaccine Supply Chain
Reed Taussig joins RSA as CEO of the Anti-Fraud Business Unit
(ISC)² reaches 20,000 certified members and associates in Asia-Pacific
A ‘Magical Bug’ Exposed Any iPhone in a Hacker’s Wi-Fi Range
Hands-On With Apple’s New MagSafe Duo Charger for iPhone 12 and Apple Watch
BrandPost: Cybersecurity Best Practices for Protecting Brand Trust
How infrastructure as code can help deliver next-level digital transformation
Traffic estimation tool makes predictions from sparse public data
Phishing campaign threatens coronavirus vaccine supply chain
How dozens of Trump’s political appointees will stay in government after Biden takes over
SASE model drives improved cloud and work-from-home security
DEF CON 28 Safe Mode Aerospace Village – Matt Murray’s ‘Satellite Orbits 101’
Phishing Campaigns Target Multiple Organizations in COVID-19 Cold Chain
Intel’s ControlFlag taps AI to automatically detect errors in code
Dell announces new protections for its PC and server supply chain
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
TrickBot Malware Can Scan Systems for Firmware Vulnerabilities
GitHub Says Vulnerabilities in Some Ecosystems Take Years to Fix
Apple Seeds Second Beta of Upcoming macOS Big Sur 11.1 Update to Developers
Apple Now Letting Developers Enroll for Reduced 15% App Store Fees
Hillary and Chelsea Clinton to Host Apple TV+ Docuseries ‘Gutsy Women’
Law Enforcement Purchasing Commercially-Available Geolocation Data is Unconstitutional
Crooks posing as COVID-19 ‘cold chain’ company phished EU for vaccine intel, says IBM
Cyber Criminals Tried to Gain Access to COVID-19 Vaccine ‘Cold Chain’
AppleCare Memo Hints at Potential Hardware Announcement Next Tuesday
Zero-Click exploit allowed attackers to hack any targeted iPhone
#WebSummit: Companies of the Future Should Focus on Data Privacy Rather than Data Collection
Hackers Are Targeting The COVID Vaccine Cold Chain Supply Process
Apple Patent Filing Reveals Dual Monitor Stand for Pro Display XDR
Deals: StackSocial’s Cyber Monday Mac Bundle Sale Continues With 12 Apps Priced at $42
Expert On Open Source Software Security Vulnerabilities Exist For Over Four Years Before Detection
A Week with the New MacBook Air – Intego Mac Podcast Episode 164
Open-source: Almost one in five bugs are planted for malicious purposes
Data of 243 million Brazilians exposed online via website source code
As Modern Mobile Enables Remote Work, It Also Demands Security
Popular Android apps still vulnerable to patched security flaw
State-Sponsored Hackers Likely Behind Attacks on COVID-19 Vaccine Cold Chain
US, Estonia Partnered to Search Out Cyber Threat From Russia
TrickBot Malware Scans Systems for UEFI/BIOS Vulnerabilities
S3 Ep9: Gift card hacks, dubious doorbells and Wi-Fi tips [Podcast]
UK Orgs Told to Prepare for New Wave of Brexit-Related Scams
From FUD to Fix: Why the CISO-Vendor Partnership Needs to Change Now
Ensure Your Friends and Family Are Scam Savvy this Holiday Season
Aircraft maker Embraer admits hackers breached its systems and stole data
Egregor Ransomware, Used in a String of High-Profile Attacks, Shows Connections to QakBot
Deals: Amazon Discounting 256GB M1 MacBook Pro to $1,199.99 ($100 Off)
Security Expert Re: Non-Profit Philadelphia Food Bank Loses Nearly A Million Dollars To BEC Scam
Op-ed: Why President-elect Biden needs to appoint a cybersecurity czar
IBM uncovers global email attack on Covid vaccine supply chain
Manage, govern, and get more value out of your data with Azure Purview
Acronis Cyberthreats Report predicts 2021 will be the “year of extortion”
Omaha: The little-known Google technology behind automatic updates in Edge
Code42 Incydr Series: Honing in on High-Risk Users with Code42 Incydr
Bridging the Cybersecurity Skills Gap as Cyber Risk Increases
Drugs in Europe: enhancing law enforcement responses to high-risk organised crime
Google Security Researcher Develops ‘Zero-Click’ Exploit for iOS Flaw
Recommended Controls for Maintaining HIPAA Security Compliance
Netenrich Intelligent SOC-as-a-Service Right-Sizes Cybersecurity for Mid-Market Enterprises
CISSPs from Around the Globe: An Interview with Jerome Leach
How attackers exploit Window Active Directory and Group Policy
TrickBot gets new UEFI attack capability that makes recovery incredibly hard
Critical Oracle WebLogic Vulnerability Flaw Actively Exploited by DarkIRC Malware
Mysterious phishing campaign targets organizations in COVID-19 vaccine cold chain
Google researcher: I made this ‘magic’ iPhone Wi-Fi hack in my bedroom, imagine what others could do
FBI Warns of Auto-Forwarding Email Rules Abused for BEC Scams
New Law to Crack Down on Fraudulent Foreign Firms Listed in US
#WebSummit: Balancing Security, Privacy and Free Speech in the Digital Age
IBM Releases Report on Cyber Actors Targeting the COVID-19 Vaccine Supply Chain
What Does a Unified Security Strategy in the Public Cloud Look Like?
Apple Launches Redesigned Accessibility Site and New Support Videos
Ecobee SmartCamera Firmware Update Adds HomeKit Secure Video Support
Apple Could Be Forced to Include a Charger with Every iPhone Sold in Brazil
iPhone Zero-click Wi-Fi Exploit Is One Of The Most Breathtaking Hacks Ever
Experts Reaction On Dua Lipa And Other Spotify Artists’ Pages Hacked By Taylor Swift ‘Fan’
Open source vulnerabilities go undetected for over four years
IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain
Widespread android applications still exposed to vulnerability on google play core library
Several Unpatched Popular Android Apps Put Millions of Users at Risk of Hacking
TrickBot Malware Gets UEFI/BIOS Bootkit Feature to Remain Undetected
Clop Ransomware gang claims to have stolen 2 million credit cards from E-Land
APT annual review: What the world’s threat actors got up to in 2020
Google Authenticator iOS App Gains New Export Accounts Option
New malicious NPM packages Used by Attackers Install njRAT Remote Access Trojan
Multiple iPhone 12 Users Report Sudden Drops in 5G and LTE Cellular Coverage
Trump Threatens To Veto US Defence Bill Over Section 230 Protection
A scan of 4 Million Docker images reveals 51% have critical flaws
AI can guess 100 billion Cyber Attacks before they take place
Bioterrorists to trick COVID-19 Vaccine Developers with Malware
Face recognition software making progress at recognizing masked faces
How to Protect Your Business From Multi-Platform Malware Systems
Cloud-native benefits stifled by critical security and networking issues
Spamhaus Intelligence API: Free threat intelligence data for security developers
Bitdefender launches cloud-based EDR solution for enterprises and MSPs
2020-12-03 – Pcap and malware for an ISC diary (traffic analysis quiz)
Surveillance Bill to hand AFP and ACIC a trio of new computer warrants
3 Ways to Streamline Network Security Automation That Will Transform Your Organization
AWS unveils three analytics capabilities to improve Amazon Redshift performance
AWS releases four storage innovations to add storage performance, resiliency, and value to customers
CloudBees releases first two modules of its Software Delivery Management solution
The Statutory Authority for Barr’s Appointment of Durham as Special Counsel
DFLabs IncMan SOAR to be available both on-premise and as a cloud package
PagerDuty to action real-time critical observability data on AWS
Salesforce Hyperforce: Connecting customer data across systems, apps and devices
DOJ’s China hack indictments offer businesses key threat intel, officials say
Open Source Flaws Take Years to Find But Just a Month to Fix
$99 Speaker Showdown: HomePod Mini vs. Amazon Echo and Google Nest Audio
Mastercard appoints Richard Verma as Executive VP of Global Public Policy and Regulatory Affairs
Generated on 2020-12-04 23:55:13.082311