Cyborgs, trolls and bots can fill the internet with lies and half-truths. Understanding them is key to learning how misinformation spreads online. read more Advertise on IT Security News. Read the complete article: Cyborgs, Trolls and Bots: A Guide…
Tag: SecurityWeek RSS Feed
Chrome Will Block Insecure Downloads on HTTPS Pages
In an attempt to improve the security of its users, the Chrome browser will soon start blocking insecure downloads on HTTPS pages, Google announced. The plan, which the Internet giant laid out this week, is expected to be completed sometime…
IoT Devices at Major Manufacturers Infected With Malware via Supply Chain Attack
Three of the world’s largest manufacturers had some IoT devices running Windows 7 infected with a piece of malware in what experts believe to be a supply chain attack. read more Advertise on IT Security News. Read the complete…
Organizations Quick to Patch Critical Citrix ADC Vulnerability
More than 80 percent of organizations impacted by CVE-2019-19781, a critical vulnerability in the Citrix Application Delivery Controller (ADC) and Gateway, have already taken steps to secure their deployments. read more Advertise on IT Security News. Read the complete…
DoJ Looking for Victims of ‘Quantum Stresser’ DDoS Service
The U.S. Department of Justice has asked victims of the Quantum Stresser DDoS-for-hire service, whose operator was recently sentenced, to come forward. read more Advertise on IT Security News. Read the complete article: DoJ Looking for Victims of ‘Quantum…
Brazil Judge Rejects Hacking Accusation Against Greenwald
A judge in Brazil’s capital on Thursday dismissed accusations that journalist Glenn Greenwald was involved in hacking phones of officials, following weeks of criticism that his prosecution would infringe on constitutional protections for the press. read more Advertise on…
Smart, or Not So Smart? What the Ring Hacks Tell Us About the Future of IoT
Late last year, the news was full of stories about smart cameras that had been hacked. read more Advertise on IT Security News. Read the complete article: Smart, or Not So Smart? What the Ring Hacks Tell Us About…
Critical Bluetooth Vulnerability Exposes Android Devices to Attacks
One of the security flaws that Google addressed with the February 2020 set of Android patches is a critical vulnerability in Bluetooth that could lead to code execution. read more Advertise on IT Security News. Read the complete article:…
Malicious Optimizers Hosted on Google Play Amassed 470,000 Downloads
Malicious optimizer, booster, and utility applications hosted on Google Play gathered nearly half a million downloads before being taken down, Trend Micro reports. read more Advertise on IT Security News. Read the complete article: Malicious Optimizers Hosted on Google…
Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches
Japanese defense contractors Pasco and Kobe Steel this week disclosed cyber intrusions they suffered back in 2016 and 2018. read more Advertise on IT Security News. Read the complete article: Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches
Iranian Hackers Target Journalists in New Phishing Campaign
The Iran-linked threat group know as “Charming Kitten” has been targeting journalists, political and human rights activists in a new campaign aimed at stealing email account credentials, Certfa Lab reports. read more Advertise on IT Security News. Read the…
New Campaign Leverages BitBucket to Deliver Arsenal of Malware
Active Campaign Uses BitBucket Cloud Storage Platform to Deliver 7 Different Malware Payloads read more Advertise on IT Security News. Read the complete article: New Campaign Leverages BitBucket to Deliver Arsenal of Malware
Cloud Security Firm Netskope Raises $340 Million at $3 Billion Valuation
Cloud security company Netskope on Thursday announced that it has raised $340 million in a Series G funding round, valuing the firm at nearly $3 billion. read more Advertise on IT Security News. Read the complete article: Cloud Security…
DLL Hijacking Vulnerability Found in Realtek HD Audio Driver
A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered. Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve…
Patch Management Company Automox Raises $30 Million
US-based cyber hygiene and patch management company Automox this week announced that it has raised $30 million in a Series B funding round, which brings the total raised by the firm to $42 million. read more Advertise on IT…
Forescout Technologies to be Acquired in $1.9 Billion Deal
Enterprise device security firm Forescout Technologies (NASDAQ:FSCT) announced on Thursday that it has agreed to be acquired by private equity firm Advent International in a deal valued at $1.9 billion. read more Advertise on IT Security News. Read the…
Louisiana Governor Urges Officials to Ready for Cyberattacks
Gov. John Bel Edwards called on Louisiana’s local government leaders Wednesday to protect their data, reminding them of recent cyberattacks across the state and saying they’re likely to face such a strike in the future. read more Advertise on…
FBI Director Warns of Ongoing Russian ‘Information Warfare’
FBI Director Chris Wray said Wednesday that Russia is engaged in “information warfare” heading into the 2020 presidential election, though he said law enforcement has not seen ongoing efforts by Russia to target America’s election infrastructure. read more Advertise…
Chrome 80 Released With 56 Security Fixes
Google this week released Chrome 80 to the stable channel with 56 vulnerability patches and various other improvements to user security. read more Advertise on IT Security News. Read the complete article: Chrome 80 Released With 56 Security Fixes
Google Shared Private Videos With Wrong Users
A bug in the Google Takeout download service has resulted in some users’ videos being inadvertently shared with other people. read more Advertise on IT Security News. Read the complete article: Google Shared Private Videos With Wrong Users
CERN Physics Lab Drops Facebook Over Data Concerns
Europe’s physics lab CERN on Wednesday said it had stopped using a Facebook team-chat application because of concerns about handing over data to the US tech giant. CERN said it had wound up its Facebook Workplace account on January 31…
Hackers Can Steal Data From Air-Gapped Computers Via Screen Brightness
Researchers have shown how hackers could silently exfiltrate sensitive information from air-gapped computers by manipulating the brightness of their screen. read more Advertise on IT Security News. Read the complete article: Hackers Can Steal Data From Air-Gapped Computers Via…
Leidos Buys L3Harris Security and Automation Business for $1 Billion
Reston, VA-based Leidos Holdings has announced a definitive agreement to buy the airport security and automation businesses from UK-based L3Harris for $1 billion in cash. read more Advertise on IT Security News. Read the complete article: Leidos Buys L3Harris…
Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks
Tens of millions of Cisco devices deployed in enterprise environments are exposed to attacks due to vulnerabilities identified by researchers in a proprietary discovery protocol they all use. read more Advertise on IT Security News. Read the complete article:…
Vulnerability in WhatsApp Desktop Exposed User Files
Facebook has patched a vulnerability in WhatsApp Desktop that could allow an attacker to launch cross-site scripting (XSS) attacks and access files from the victim’s system when paired with WhatsApp for iPhone. read more Advertise on IT Security News.…
Leveraging Gap Analysis to Drive Security Metrics
Gap Analysis Can Serve as a Wonderful Driver for Improving Security Metrics read more Advertise on IT Security News. Read the complete article: Leveraging Gap Analysis to Drive Security Metrics
Smart Lightbulbs Used to Compromise Home and Business Networks
Researchers have demonstrated an ability to compromise an IoT smart bulb, and then use malware from the internet-connected bulb to infiltrate the rest of a network — regardless of whether that is a home or office. read more Advertise…
Iowa Fiasco Highlights Security Risks in US Vote, Officials Say
US officials and cyber experts warned Tuesday that the voting debacle in the Democratic caucuses in Iowa underscored the vulnerabilities in the country’s election infrastructure in everything from hacking to trust-eroding conspiracy theories. read more Advertise on IT Security…
Trial Begins for Ex-CIA Worker Charged With Leaking Secrets
A prosecutor told a jury at the opening of an espionage trial Tuesday that an angry CIA employee got his vengeance by committing the agency’s biggest leak of classified information ever, but a defense lawyer said her client was innocent.…
Cybersecurity Bill Would Set Defense Plan for Local Agencies
A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. read more Advertise on IT Security News. Read the complete article: Cybersecurity…
Sudo Vulnerability Allows Privilege Escalation to Root
A patch has been released for a vulnerability in Sudo that can be exploited by an unprivileged attacker to gain full root permissions on the targeted system. read more Advertise on IT Security News. Read the complete article: Sudo…
Irish Regulator Probes Google, Tinder Over Data Processing
Irish regulators have launched separate inquiries into Google and dating app Tinder over how they process user data, in a new round of regulatory scrutiny aimed at tech companies. read more Advertise on IT Security News. Read the complete…
Android’s February 2020 Update Patches Critical System Vulnerabilities
Google this week released the February 2020 set of security updates for the Android operating system, which address a total of 25 vulnerabilities, including 2 rated critical severity. read more Advertise on IT Security News. Read the complete article:…
Twitter Moves to Curb Manipulated Content Including ‘Deepfakes’
Twitter unveiled a plan Tuesday to curb the spread of manipulated content including “deepfake” videos as part of a move to fight misinformation which could result in violence or other harm. read more Advertise on IT Security News. Read…
Dropbox Paid Out Over $1 Million Through Bug Bounty Program
File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program. read more Advertise on IT Security News. Read the complete article: Dropbox Paid Out Over $1 Million Through Bug…
Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator
Jerusalem Venture Partners Launches Cybersecurity Hub in Partnership with New York City read more Advertise on IT Security News. Read the complete article: Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator
Vulnerabilities in Mini-SNMPD Lead to DoS, Information Disclosure
Vulnerabilities recently patched in Mini-SNMPD could be abused for denial-of-service (DoS) attacks or to obtain sensitive information, Cisco Talos’ security researchers report. read more Advertise on IT Security News. Read the complete article: Vulnerabilities in Mini-SNMPD Lead to DoS,…
Twitter Suspends Fake Accounts for Exploiting API Vulnerability
Twitter on Monday announced that it has suspended a large number of fake accounts that had exploited an API vulnerability to match usernames to phone numbers. read more Advertise on IT Security News. Read the complete article: Twitter Suspends…
HPE Acquires Identity Management Firm Scytale
Hewlett Packard Enterprise (HPE) on Monday announced that it has acquired Scytale, an identity management startup that specializes in cloud-native security and zero trust networking. read more Advertise on IT Security News. Read the complete article: HPE Acquires Identity…
Changing the Disclosure Shame Culture
For Cyberdefense to Progress, We Must Break Through the Cultural Barrier of Breach Disclosure Shame read more Advertise on IT Security News. Read the complete article: Changing the Disclosure Shame Culture
Australian Shipping Giant Toll Hit by Ransomware
Australian transportation and logistics giant Toll Group was forced to shut down some of its online services in response to a ransomware attack and customers are not happy with the way the company has handled the incident. read more …
Vulnerability in Linear eMerge Access Controllers Exploited in the Wild
Hackers are actively targeting a vulnerability in Linear eMerge E3 access controllers to infect the devices with malware and abuse them to launch distributed denial-of-service (DDoS) attacks, SonicWall revealed over the weekend. read more Advertise on IT Security News.…
Medtronic Releases Patches for Cardiac Device Flaws Disclosed in 2018, 2019
Medical device company Medtronic informed customers last week that it has released patches for some cardiac device vulnerabilities disclosed in 2018 and 2019. The vendor says it takes time to develop and validate patches for such complex and safety-critical devices…
Six Arrested in UK Over Malta Bank Cyber-Heist
Six individuals were arrested in the United Kingdom last week for their involvement in a bank cyber-heist and money laundering operation. read more Advertise on IT Security News. Read the complete article: Six Arrested in UK Over Malta Bank…
Chinese Hackers Target Hong Kong Universities With New Backdoor Variant
The China-linked threat group tracked as Winnti was observed using a new variant of the ShadowPad backdoor in recent attacks targeting Hong Kong universities, ESET’s security researchers report. read more Advertise on IT Security News. Read the complete article:…
Elevate Your Intelligence Game
Over the past five years, Cyber threat intelligence (CTI) has become one of the fastest growing elements in the cybersecurity space. Gartner expects as much as $2.3 billion to spent on it by 2023. read more Advertise on IT…
Trend Micro Patches More Vulnerabilities in Anti-Threat Toolkit
An update announced last week by Trend Micro for its Anti-Threat Toolkit (ATTK) addresses some additional attack methods related to a vulnerability initially patched in October 2019. read more Advertise on IT Security News. Read the complete article: Trend…
Japanese Electronics Giant NEC Discloses Old Data Breach
Japanese IT and electronics company NEC Corporation has revealed that hackers had access to its network for a long time, but the incident occurred several years ago. read more Advertise on IT Security News. Read the complete article: Japanese…
Election Officials Get Training Before 2020 Voting Begins
When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. read more Advertise on IT Security News. Read the complete…
Google Open Sources Code for Security Key Devices
Google on Thursday announced that it has released the source code for a project named OpenSK in an effort to allow users to create their own security key devices. OpenSK is written in Rust and it supports both FIDO U2F…
New Project Informs Security Teams of Phished Users
A newly launched project wants to help inform IT security representatives and domain owners when their users fall victim to phishing. read more Advertise on IT Security News. Read the complete article: New Project Informs Security Teams of Phished…
Researcher Finds Over 60 Vulnerabilities in Physical Security Systems
read more Advertise on IT Security News. Read the complete article: Researcher Finds Over 60 Vulnerabilities in Physical Security Systems
US Says EU Understands 5G Risks But Pushes on Huawei
The United States on Thursday welcomed the European Union’s new rules on fifth-generation internet but pressed them to go further after the bloc resisted Washington’s pressure to ban China’s Huawei directly. read more Advertise on IT Security News. Read…
With Intelligence, Fans, Businesses and NFL Can Remain Protected Against Cyber Threats
In the sports arena, the cyber and physical worlds are converged. The NFL and Super Bowl offer excellent examples of how laced together the two are. Last year, viewers streamed the Super Bowl across 7.5 million mobile devices. The NFL…
House Committee Passes Bills Improving CISA Leadership and Authority
Two bills approved this week by the House Homeland Security Committee were drafted to improve the leadership and legal authority of the Cybersecurity and Infrastructure Security Agency (CISA). read more Advertise on IT Security News. Read the complete article:…
Hackers Can Earn $20,000 for Xbox Vulnerabilities
Microsoft on Thursday announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution vulnerabilities. read more Advertise on IT Security News. Read the complete article: Hackers Can Earn $20,000…
Iranian Hackers Target U.S. Research Organization in Ongoing Campaign
A threat group linked to Iran has targeted a U.S.-based research company whose services are used by businesses and government organizations, cybersecurity firm Intezer reveals. read more Advertise on IT Security News. Read the complete article: Iranian Hackers Target…
AI-based Document Classification Firm Concentric Emerges From Stealth
Concentric Emerges from Stealth with AI Document Classification Product and $7.5 Million Seed Funding read more Advertise on IT Security News. Read the complete article: AI-based Document Classification Firm Concentric Emerges From Stealth
Flaw in ‘Code Snippets’ Plugin Exposed Many WordPress Sites to Attacks
Popular WordPress plugin Code Snippets recently received a patch for a high-severity vulnerability that can be exploited to take control of affected websites. read more Advertise on IT Security News. Read the complete article: Flaw in ‘Code Snippets’ Plugin…
Cisco Patches DoS, Information Disclosure Flaws in Small Business Switches
Cisco this week informed customers that some of its Small Business Switches are affected by high-severity vulnerabilities that can be exploited to obtain sensitive device information and to launch denial-of-service (DoS) attacks. read more Advertise on IT Security News.…
Interior Department Halts Drone Operations Over Cybersecurity Concerns
The United States Department of the Interior (DOI) this week has halted the operation of unmanned aircraft systems (UAS) over cybersecurity concerns most likely related to the use of Chinese drones. read more Advertise on IT Security News. Read…
Devices Still Vulnerable to DMA Attacks Despite Protections
Many devices, including ones often found in enterprise environments, are likely still vulnerable to direct memory access (DMA) attacks, despite the fact that hardware and software vendors have implemented protections that should prevent such attacks, firmware security company Eclypsium said…
The Best Treatment Plan for Your Security Pain Starts with a Data-Driven Diagnosis
The Value of Threat Intelligence Comes Down to Relevance and Accessibility read more Advertise on IT Security News. Read the complete article: The Best Treatment Plan for Your Security Pain Starts with a Data-Driven Diagnosis
SEO Spam Dominated Website Infections in 2019: Report
Last year, SEO spam was the most frequently observed threat on compromised websites, according to a new report from GoDaddy-owned web security company Sucuri. read more Advertise on IT Security News. Read the complete article: SEO Spam Dominated Website…
EU Stops Short of Recommending Ban on China’s Huawei
LONDON (AP) — The European Union unveiled security guidelines for next generation high-speed wireless networks that stop short of calling for a ban on Huawei, in the latest setback for the U.S. campaign against the Chinese tech company. read more…
Serious Vulnerability Discovered in OpenSMTPD
Researchers at cybersecurity firm Qualys have identified a potentially serious vulnerability in OpenSMTPD that can allow remote command execution with elevated privileges. read more Advertise on IT Security News. Read the complete article: Serious Vulnerability Discovered in OpenSMTPD
Investment in Privacy Pays Cybersecurity Dividends: Cisco
Better Privacy Means Better Security, Report Shows read more Advertise on IT Security News. Read the complete article: Investment in Privacy Pays Cybersecurity Dividends: Cisco
Magento 2.3.4 Patches Critical Code Execution Vulnerabilities
Magento 2.3.4 was released this week with patches for six vulnerabilities, including three that are considered critical. The first of these severe security issues is related to deserialization of untrusted data. Tracked as CVE-2020-3716, the bug could lead to arbitrary…
Apple Patches Tens of Vulnerabilities in iOS, macOS Catalina
Apple this week released software updates to address tens of security flaws in iOS, iPadOS, macOS Catalina, and other products. A total of 23 vulnerabilities were addressed in iOS 13.3.1 and iPadOS 13.3.1, now rolling out for iPhone 6s and…
Leaked Report Shows United Nations Suffered Hack
The United Nations has been hacked. An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says that dozens of servers were “compromised” at offices in Geneva and Vienna. read more…
New Public Company SCVX Formed to Acquire Cybersecurity Firms
World’s First Cybersecurity Special Purpose Acquisition Company (SPAC) to Build a New Cybersecurity Platform read more Advertise on IT Security News. Read the complete article: New Public Company SCVX Formed to Acquire Cybersecurity Firms
Russia Blocks Swiss-based ProtonMail Over Wave of Bomb Threats
Russia has blocked a second encrypted email provider, Swiss-based ProtonMail, in efforts to halt a prolonged series of anonymous bomb threats, the security service said Wednesday. The FSB security service said Russia acted against Geneva-based ProtonMail after blocking another social…
Use of SCPI Protocol Exposes Measurement Instruments to Attacks
Measurement instruments that support the Standard Commands for Programmable Instruments (SCPI) protocol are exposed to hacker attacks, cybersecurity firm Trend Micro warned on Tuesday. read more Advertise on IT Security News. Read the complete article: Use of SCPI Protocol…
Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019
Google claims it paid out over $6.5 million through its bug bounty programs in 2019, which brings the total awarded by the company since the launch of its first program in 2010 to more than $21 million. read more …
Firm Says Wawa Customers’ Hacked Credit Card Info Being Sold
Convenience store giant Wawa Inc. said Tuesday it is responding to reports that hacked information from its customers’ credit cards may be being sold on the dark web. read more Advertise on IT Security News. Read the complete article:…
Ring Doorbell App for Android Sends Out Loads of User Data
The Ring doorbell application for Android contains third-party trackers and sends out a large amount of personally identifiable information (PII), the Electronic Frontier Foundation (EFF) has discovered. read more Advertise on IT Security News. Read the complete article: Ring…
Facebook Rolls Out Tool Globally to Clear Third-Party Data
Facebook said Tuesday a new tool allowing users of the social network to view and delete data it collects from third parties is rolling out to the estimated two billion members of the leading social network worldwide. read more …
Vulnerability Allowed Attackers to Join Zoom Meetings
A vulnerability in the Zoom online meeting system could allow attackers eavesdrop on meetings and view all shared content, Check Point security researchers have discovered. read more Advertise on IT Security News. Read the complete article: Vulnerability Allowed Attackers…
New Snake Ransomware Targets ICS Processes
A recently uncovered piece of file-encrypting ransomware, which some believe may be linked to Iran, has been targeting processes and files associated with industrial control systems (ICS). read more Advertise on IT Security News. Read the complete article: New…
Millions of Devices Using LoRaWAN Exposed to Hacker Attacks
Millions of devices deployed across a wide range of sectors could be exposed to hacker attacks due to security issues associated with the use of LoRaWAN, cybersecurity firm IOActive warned on Tuesday. read more Advertise on IT Security News.…
DEF CON China Conference Postponed Amid Coronavirus Outbreak
The second edition of the DEF CON China hacking conference has been put on hold as the country is fighting the coronavirus outbreak. read more Advertise on IT Security News. Read the complete article: DEF CON China Conference Postponed…
AppOmni Raises $10 Million to Help Companies Prevent Cloud Misconfigurations
Software-as-a-Service (SaaS) Security and Management Platform Provider Raises $10 Million in Series A Funding read more Advertise on IT Security News. Read the complete article: AppOmni Raises $10 Million to Help Companies Prevent Cloud Misconfigurations
Engaging the Attacker Prior to Impact
Engaging Attacker Prior to Impact Will Significantly Reduce the Overall Operational Risk of Your Networks read more Advertise on IT Security News. Read the complete article: Engaging the Attacker Prior to Impact
UK Approves Restricted Huawei Role in 5G Network
Britain on Tuesday greenlighted a limited role for Chinese telecoms giant Huawei in the country’s 5G network, but underscored that “high risk vendors” would be excluded from “sensitive” core infrastructure. read more Advertise on IT Security News. Read the…
Google Halts Publishing of Paid Chrome Extensions Due to Fraud
After observing an increase in the number of fraudulent transactions, Google over the weekend announced that it halted the publishing of paid items to the Chrome Web Store. read more Advertise on IT Security News. Read the complete article:…
Cisco Launches Industrial IoT Security Solution
Cisco on Tuesday announced the launch of a security solution for the Industrial Internet of Things (IIoT) that is designed to help organizations identify threats across their IT and OT environments. read more Advertise on IT Security News. Read…
CacheOut/L1DES: New Speculative Execution Attack Affecting Intel CPUs
Intel on Monday informed customers that researchers have identified yet another speculative execution attack method that can be launched against systems that use its processors. read more Advertise on IT Security News. Read the complete article: CacheOut/L1DES: New Speculative…
Attacks on ADC Ramp Up as Citrix Releases Remaining Patches
Citrix has released the full set of patches for the recently disclosed security flaw tracked as CVE-2019-19781, but attacks on vulnerable systems are ramping up. read more Advertise on IT Security News. Read the complete article: Attacks on ADC…
Rui Pinto: Hacker Who Targeted Football and Angola’s ‘Princess’
Prosecutors in Portugal have denounced him as a criminal hacker, but his supporters describe the man behind the “Luanda Leaks” revelations as a public interest whistleblower. read more Advertise on IT Security News. Read the complete article: Rui Pinto:…
German Privacy Watchdog Investigates Clothing Retailer H&M
A German privacy watchdog says it has opened an investigation into clothing retailer H&M amid evidence that the Swedish retailer had committed “massive data protection breaches” by spying on its customer service representatives in Germany. read more Advertise on…
Three Magecart Hackers Arrested in Indonesia
Three individuals suspected of being involved in Magecart online skimming attacks were arrested late last year in Indonesia. read more Advertise on IT Security News. Read the complete article: Three Magecart Hackers Arrested in Indonesia
Lessons Learned From 2016, but U.S. Faces New Election Threats
It’s been more than three years since Russia’s sweeping and systematic effort to interfere in U.S. elections through disinformation on social media, stolen campaign emails and attacks on voting systems. U.S. officials have made advances in trying to prevent similar…
World Economic Forum on Securing the Aviation Industry in the Age of Convergence
World Economic Forum Calls for Global Collaboration to Enhance Cyber Resilience in the Aviation Industry read more Advertise on IT Security News. Read the complete article: World Economic Forum on Securing the Aviation Industry in the Age of Convergence
NSA Shares Guidance on Mitigating Cloud Vulnerabilities
The U.S. National Security Agency (NSA) has published advice on mitigating cloud vulnerabilities. While the advice is primarily designed for government agencies and departments, it nevertheless contains good advice for any commercial organization considering or embarking on — or already…
Huawei and Supply Chain Security – The Great Geopolitical Debate
read more Advertise on IT Security News. Read the complete article: Huawei and Supply Chain Security – The Great Geopolitical Debate
Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric Hack
A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product. read more Advertise on IT Security News.…
PoC Exploits Created for Recently Patched ‘BlueGate’ Windows Server Flaws
Proof-of-concept (PoC) exploits have been released for two recently patched Remote Desktop Gateway vulnerabilities that can be exploited for remote code execution. read more Advertise on IT Security News. Read the complete article: PoC Exploits Created for Recently Patched…
Trump, Johnson Talk Security Ahead of Huawei Decision
Prime Minister Boris Johnson discussed telecoms security with US President Donald Trump as he prepares to announce if Britain will use China’s Huawei in its 5G networks, officials said Saturday. read more Advertise on IT Security News. Read the…
Cisco Webex Vulnerability Exploited to Join Meetings Without a Password
Cisco on Friday informed customers that it has patched a vulnerability that allowed unauthorized users to join password-protected Webex meetings. Cisco said the flaw had been exploited. read more Advertise on IT Security News. Read the complete article: Cisco…
Questions Linger Over Investigation Into Jeff Bezos’ Hacking
Cybersecurity experts said Thursday there were still many unanswered questions from an investigation commissioned by Jeff Bezos that concluded the billionaire’s cellphone was hacked, apparently after receiving a video file with malicious spyware from the WhatsApp account of Saudi Arabia’s…