Judge Pushes Back Restart in Accused LinkedIn Hacker's Trial to May

... Francisco has again postponed the resumption of a criminal trial against a Russian man accused of hacking Silicon Valley technology companies.

Posted on 9 April 2020 | 4:22 pm

Senator calls on FTC to create guidelines for video teleconferencing software

Senator says online conferencing software needs to be regulated and follow basic privacy and security rules.

Posted on 9 April 2020 | 4:14 pm

Can you use a 3-D printer to hack a fingerprint scanner?

A research team from Cisco Talos found that they could hack the fingerprint scanners on many common electronic devices with just $2,000 and a 3-D ...

Posted on 9 April 2020 | 4:11 pm

No more Zoom for home learning after hacking incident

The hacking happened during a geography lesson for a Secondary 1 class. Hackers hijacked the streaming and showed the students pictures of ...

Posted on 9 April 2020 | 4:00 pm

problable malfunction from malware infection

hi after scanning and disinfecting my device from malware (trojasn , adware,etc) with malware bytes adn roguekiller and bitdefender and farbar ...

Posted on 9 April 2020 | 4:00 pm

Hacker Pinto moved to house arrest

LISBON • Portuguese hacker Rui Pinto, the originator of Football Leaks, who is facing trial for attempted blackmail, has been placed under house ...

Posted on 9 April 2020 | 4:00 pm

Work from home opens doors to cyber threats

Cyber security leaders suggest setting up Virtual Private Networks (VPN) to ensure information transmitted to the internet comes from a private server ...

Posted on 9 April 2020 | 3:48 pm

Living Security Raises $5M to Gamify Cybersecurity Training

The startup gives individuals cybersecurity training through a gamified platform that's supposed to make learning fun. Its flagship product is its Cyber ...

Posted on 9 April 2020 | 3:48 pm

Phishing attacks could be on the rise while people stay at home during COVID-19 pandemic

Ansbach works for New York-based Aon Cyber Solution, a global cybersecurity firm that does data breach response and data security consulting for ...

Posted on 9 April 2020 | 3:48 pm

Travelex paid the ransom, breach investigation still underway: report

If Travelex didn't pay the ransom, they would publicly publish the data. ... Pulse Secure VPN had a significant security patch issued last year.

Posted on 9 April 2020 | 3:37 pm

Travelex Reportedly Paid $2.3M Ransom To Hackers

The Journal said they participated in an online chat with a group of hackers who claim to have hacked Travelex in January and said they had received ...

Posted on 9 April 2020 | 3:37 pm

Concerns emerging with NFL's plan for 'virtual' draft — hacking, and health risks

ESPN reported earlier this week that some teams' coaches and front-office members have been reluctant to have their teams IT employees come into ...

Posted on 9 April 2020 | 3:03 pm

Hackers display 'offensive images' during Maine government virtual meeting

The state cancelled a virtual meeting for children's health care providers on Thursday after hackers displayed “offensive images” to participants.

Posted on 9 April 2020 | 3:03 pm

Best Security And Privacy Practices For Remote Work Environments

This transition creates unique challenges to protecting a company against a security breach or loss of client or company data. As a result, additional ...

Posted on 9 April 2020 | 3:03 pm

As Pandemic-Related Traps Spawn Cyberattacks, How Ready Are You?

New approaches to runtime application memory protection are also helping enterprises eliminate attacks commonly used in cyber warfare that target ...

Posted on 9 April 2020 | 2:52 pm

Tackling the Cybersecurity Challenges of Our “New Normal”

Within one short month, “business as usual” has become anything but. Millions of workers have shifted to remote work, been redeployed to focus on ...

Posted on 9 April 2020 | 2:52 pm

PC Matic Unveils Ransomware, RDP Threat Protection Solutions for MSPs

PC Matic, an antivirus software provider, has added Ransomware Lifeline and RDP Lifeline cyber threat protection solutions to its MSP-focused ...

Posted on 9 April 2020 | 2:41 pm

Cyber security experts warn about “Zoom bombing”

The president of cyber security company PC Matic tells us people are more vulnerable to cyber attacks than ever before. “You see spikes when there's a ...

Posted on 9 April 2020 | 2:41 pm

5 router settings you must change to protect your network

There are different types of Wi-Fi encryption, and you have to make sure you use the most secure one you can. The most widely-used Wi-Fi security ...

Posted on 9 April 2020 | 2:18 pm

Hacked Zoom meeting exposes up to 50 elementary school students to pornography

A video meeting hosted by Utah's Alpine School District was hacked, revealing pornographic images to dozens of elementary school students last ...

Posted on 9 April 2020 | 2:07 pm

SEC Settles With Traders Accused of Hacking Its Edgar Database

(Bloomberg) -- The U.S. Securities and Exchange Commission agreed to settle fraud claims against two men accused of profiting from an ...

Posted on 9 April 2020 | 2:07 pm

Data Privacy Firm Privitar Raises $80 Million in Series C Funding Round

London-based data privacy company Privitar this week announced that it has raised $80 million in a Series C funding round, which brings the total amount raised to date to more than $143 million.

read more

Posted on 9 April 2020 | 1:57 pm

Emails Impersonating Trump, White House Seek to Exploit Pandemic Fears

"For example, we saw a phishing email with malware that said the sender could not travel because of the lockdown," he says. INKY has also observed ...

Posted on 9 April 2020 | 1:45 pm

Railroads, suppliers commit to transparency on cyber attacks

Amir Levintal, chief executive officer of Cylus — a railroad cybersecurity solution provider — has noticed an increase in cyber attacks in the rail ...

Posted on 9 April 2020 | 1:33 pm

Reducing the risk of email attacks

Malicious emails are a major security risk for many organizations. ... at organizations continue to lead to data breaches and ransomware attacks that ...

Posted on 9 April 2020 | 1:33 pm

Reducing the risk of email attacks

Malware attacks consist of fake emails sent to unsuspecting employees. The goal of every malware email is to lure the employee into double-clicking ...

Posted on 9 April 2020 | 1:33 pm

Railroads, suppliers commit to transparency on cyber attacks

The information is also shared with government security officials in the United States and Canada. Warding off attack threats. The type of threats reported ...

Posted on 9 April 2020 | 1:33 pm

Working with Government to Help Secure Our Elections

Working with Government to Help Secure Our Elections. Security blog default. April 9, 2020. Dave Gerry. KEYWORDS cyber security / data breach / ...

Posted on 9 April 2020 | 1:22 pm

Copycat Site Serves Up Raccoon Stealer

Visitors to the fake site expecting antivirus offerings will instead encounter the Fallout exploit kit and a possible malware infection. Someone is ...

Posted on 9 April 2020 | 1:22 pm

COVID-19 Lures Only a Fraction of Daily Phishing Emails

Microsoft Sees 60,000 COVID-19 Phishing Emails Every Day

The number of COVID-19-themed attacks has increased significantly over the past couple of months, but they represent only a fraction of daily threats, security firms say.

read more

Posted on 9 April 2020 | 1:21 pm

Latest Botnet Offers DDoS Attacks on Demand

Once the Dark Nexus malware has taken over a device, it uses techniques similar to Mirai to maintain its presence. For example, it binds itself to port ...

Posted on 9 April 2020 | 1:00 pm

No STEM, No Problem: How to Close the Security Workforce Gap

What Makes a Good Candidate? An analyst certainly does have to understand computers and networking, as well as how information systems can be ...

Posted on 9 April 2020 | 1:00 pm

US Senate, German government tell staff not to use Zoom

The two organizations now join a list that also includes the Taiwanese government, the Australian government, SpaceX, Google, and New York state area schools.

Posted on 9 April 2020 | 12:56 pm

Amid COVID-19, CIOs Prioritize Cybersecurity, Cloud, AI

The COVID-19 pandemic has shifted the top concerns of enterprise CIOs, who are now prioritizing their spending on areas such as cybersecurity, ...

Posted on 9 April 2020 | 12:48 pm

Amid COVID-19, CIOs Prioritize Cybersecurity, Cloud, AI

The COVID-19 pandemic has shifted the top concerns of enterprise CIOs, who are now prioritizing their spending on areas such as cybersecurity, ...

Posted on 9 April 2020 | 12:48 pm

TCU Announces Appointments, Promotion

He is founder and CEO of the consulting firm Hollasec Information Security. Holleran eaned a master's degree in computer information systems at Grand ...

Posted on 9 April 2020 | 12:48 pm

Perspective: Cybersecurity Advice That's Too Good to be True

Overheard (while walking the floor at RSA): Cybersecurity is about risk discovery, prevention, and mitigation. Manage all of the impending threats and ...

Posted on 9 April 2020 | 12:48 pm

Perspective: Cybersecurity Advice That's Too Good to be True

If we want to improve security, we need to implement controls that protect users from themselves. Secure All Computers. “The only secure computer is off ...

Posted on 9 April 2020 | 12:48 pm

CARES Act stimulus payments: What to know and what to watch for

Sara Flores serves as senior vice president and chief information security officer for UMB Financial Corporation, overseeing UMB's information ...

Posted on 9 April 2020 | 12:48 pm

Do risks really stem from not investing in your cybersecurity staff?

Sounds about right? In the recently published Part II of the Enterprise Strategy Group (ESG) and the ISSA (Information Systems Security Association) “ ...

Posted on 9 April 2020 | 12:37 pm

Govt computer systems under threat online

The Commonwealth Cyber Security Posture report assessed government entities' progress in meeting eight essential mitigation strategies. The ...

Posted on 9 April 2020 | 12:37 pm

Daily Deal: The Ultimate Cybersecurity Bundle

The Ultimate Cybersecurity Bundle has 9 courses to help you master network monitoring, pentesting, routing techniques, and more. You'll learn about ...

Posted on 9 April 2020 | 12:37 pm

Foreign National and American Trader Settle Fraud Charges in EDGAR Hacking Case

Washington, D.C.--(Newsfile Corp. - April 9, 2020) - The Securities and Exchange Commission today announced settlements with David Kwon and ...

Posted on 9 April 2020 | 12:26 pm

Accenture acquires Revolutionary Security, third cybersecurity purchase this year

Cybersecurity has increased in importance over the past few years as more of the world's infrastructure moves onto the cloud and remote work has ...

Posted on 9 April 2020 | 12:26 pm

Govt computer systems under threat online

The Commonwealth Cyber Security Posture report assessed government entities' progress in meeting eight essential mitigation strategies.

Posted on 9 April 2020 | 12:26 pm

Today's Headlines and Commentary

Cybersecurity agencies in the U.S. and the U.K. yesterday issued a warning that cyber criminals are scaling up attacks on health care groups and ...

Posted on 9 April 2020 | 12:15 pm

“If a client isn't serious about security we would walk away,” says OryxAlign CEO Carl Henriksen

It now has 80 employees, with two main offices in London and Manchester. The MSP's key focuses are around cyber security and cloud, providing ...

Posted on 9 April 2020 | 12:03 pm

NTT Research Distinguished Scientist Brent Waters & UCLA Professor Amit Sahai Win IACR Test ...

... today announced that a paper co-authored in 2005 by Dr. Brent Waters, a distinguished scientist in its Cryptography and Information Security (CIS) ...

Posted on 9 April 2020 | 12:03 pm

Google, Microsoft talk up security after Zoom firestorm

... the security features Microsoft already offers Team users, including how it encrypts data and handles enforcement requests – two areas where Zoom ...

Posted on 9 April 2020 | 12:03 pm

New cybersecurity masters program headed to the University of Georgia

UGA created its Institute for Cybersecurity and Privacy in 2017 in large part to meet the needs of the new U.S. Army Cyber Command headquarters at ...

Posted on 9 April 2020 | 12:03 pm

UGA likely to add advanced degree in cybersecurity

ATLANTA — The University System of Georgia is poised to add a new advanced degree in cybersecurity. The Board of Regents' Academic Affairs ...

Posted on 9 April 2020 | 12:03 pm

Equifax hires Sabre Travel Network marketing exec to its C-Suite

... marketing officer and US Information Services (USIS) Marketing Officer. ... turnover among its executives since its disastrous data breach announced ...

Posted on 9 April 2020 | 11:52 am

Schneier on Hacking Society

How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce ...

Posted on 9 April 2020 | 11:52 am

Hackers Invited to Share Bug Bounties with #COVID19 Charity

A bug bounty platform is inviting hackers to share the proceeds of their successful bug hunts with the COVID-19 Solidarity Response Fund. On April 8 ...

Posted on 9 April 2020 | 11:52 am

Breacher Feature: Marriott's Second Breach in Three Years

The 2018 data breach was the result of a failed cloud security strategy during the Marriott-Starwood Merger. A few weeks ago, Marriott confirmed a ...

Posted on 9 April 2020 | 11:52 am

Zoom Encryption, Whatsapp Encryption…Wait, Let's Not Forget About Email Encryption

Let's hash it out. Zoom's Not-So-Secure Encryption. After a report by Bill Marczak and John Scott-Railton revealing a few Zoom security vulnerabilities ...

Posted on 9 April 2020 | 11:41 am

DARPA snags Intel to lead its machine learning security tech

The existing mitigations against machine learning attacks are typically rule-based and pre-defined, but DARPA hopes it can develop GARD into a ...

Posted on 9 April 2020 | 11:29 am

Covid-19: Going to war with the cybersecurity you've got

The time has passed for tabletop exercises and carefully crafted policies about cybersecurity. We are in the fight now. We all wish that we were better ...

Posted on 9 April 2020 | 11:19 am

Antivirus Software Market | Business Opportunities Analysis Focus on Research Technology and ...

Antivirus Software Market applies the best of primary and secondary research to weigh on the competitive landscape and the main market players ...

Posted on 9 April 2020 | 11:18 am

City settles with Equifax for $1.5M over data breach

The City of Chicago announced it has settled a lawsuit against Equifax over a data breach that jeopardized the personal information of more than 40% ...

Posted on 9 April 2020 | 11:18 am

Into Security Podcast - Episode 13

... the various COVID-19 threats impacting the infosec industry, new cyber-attack prevention research and upcoming Infosecurity Magazine content.

Posted on 9 April 2020 | 11:18 am

Cyber Security ETFs to Thrive in the Virus-Hit Economy

To combat such threats, an international group of nearly 400 volunteers has been formed with expertise in cybersecurity at major companies like ...

Posted on 9 April 2020 | 11:07 am

Exterro Launches Groundbreaking Incident and Breach Management Solution

Exterro's Incident and Breach Management solution fills the gap between Information Security and Legal when responding to cybersecurity incidents ...

Posted on 9 April 2020 | 11:07 am

Cyber Security ETFs to Thrive in the Virus-Hit Economy

Also, a major hospital in Europe faced a cyberattack that “forced it to suspend scheduled operations, shut down its IT network, and move acute-care ...

Posted on 9 April 2020 | 11:07 am

Cyber Security ETFs to Thrive in the Virus-Hit Economy

To combat such threats, an international group of nearly 400 volunteers has been formed with expertise in cybersecurity at major companies like ...

Posted on 9 April 2020 | 11:07 am

USPS online service can alert you when your stimulus check is coming

Retirees who receive either Social Security retirement or Railroad Retirement benefits will also receive payments automatically. Who is not eligible?

Posted on 9 April 2020 | 11:06 am

Three Ways Businesses Can Use The SHIELD Act To Protect Against Rising COVID-19 Cyber Fraud

A robust data security protection program is essential for protecting any business. The Department of Justice warns that cyber criminals will likely ...

Posted on 9 April 2020 | 10:56 am

IDC Report: MixMode – An Unsupervised AI-Driven Network Traffic Analysis Platform

In it, she examines how MixMode's AI-enabled, multistream security platform empowers security teams to solve the information overload problem by ...

Posted on 9 April 2020 | 10:56 am

Information security auditor certifications

Not only does it allow you to work in information security, but you also get to put your auditor hat to good use by creating highly detailed reports that ...

Posted on 9 April 2020 | 10:56 am

Cybersecurity For Cars Market Witness Highest Growth In Near Future 2024 | Leading Key Players ...

You get the detailed analysis of the current market scenario for Cybersecurity For Cars and a market forecast till 2024 with this report. The forecast is also ...

Posted on 9 April 2020 | 10:56 am

Blue Cross offers tips to avoid COVID scams

It's important to be alert, especially if you are approached by someone ... If your credit card is stolen or there is a data breach at a retailer where you ...

Posted on 9 April 2020 | 10:45 am

LA respiratory hospital hit by supplier data breach

A Los Angeles hospital that specializes in treating respiratory diseases says its patients' personal data may have been exposed during a breach at one ...

Posted on 9 April 2020 | 10:45 am

WhatsApp's spyware lawsuit against NSO Group could change cyber espionage laws forever

Because an international cyber attack is orchestrated by someone sitting at a computer in a different country, US courts have historically ruled that this ...

Posted on 9 April 2020 | 10:33 am

BlackBerry researchers say China-affiliated groups have infiltrated Linux systems for years

Because most threat researchers focus on Windows malware — not unexpected given the volume of it — there's a low detection rate of Linux malware, ...

Posted on 9 April 2020 | 10:33 am

Information Security Training 2020 market is booming worldwide and is being examined in the ...

Information Security Training Market Forecast to 2027 – Global Analysis and Forecasts by Deployment Type, End-User, Region, and Market Players.

Posted on 9 April 2020 | 10:31 am

Avoiding Danger with Secure Data Storage

With the enactment of HIPAA, CCPA and GDPR, data breaches have serious liabilities for any company that holds sensitive consumer information, ...

Posted on 9 April 2020 | 10:22 am

Officials recommend ways to stay cyber secure while working remotely

The Wisconsin Better Business Bureau gave tips for practicing cybersecurity while working remotely. The first tip is to remember to save your work and ...

Posted on 9 April 2020 | 10:12 am

Cyber Security Cloud's Cloud-Based WAF "Shadankun" Has Been Adopted by More Than 1000 ...

TOKYO, April 9, 2020 /PRNewswire-PRWeb/ -- Cyber Security Cloud announced today that its cloud-based Web Application Firewall (WAF) service ...

Posted on 9 April 2020 | 10:11 am

Cyber Security Cloud's Cloud-Based WAF "Shadankun" Has Been Adopted by More Than 1000 ...

Demand is growing against the backdrop of a succession of diversified cyber-attacks such as DDoS attacks and ransomware, and the demand for new ...

Posted on 9 April 2020 | 10:11 am

Cyber Security Cloud's Cloud-Based WAF "Shadankun" Has Been Adopted by More Than 1000 ...

Cyber Security Cloud announced today that its cloud-based Web Application Firewall (WAF) service has been adopted by over 1,000 companies in ...

Posted on 9 April 2020 | 10:11 am

Remove Mpaj ransomware (Removal Instructions) - Recovery Instructions Included

Mpaj ransomware – file locking malware that belongs to the notorious Djvu virus family. Mpaj ransomware is a data locking malware that is mainly ...

Posted on 9 April 2020 | 10:11 am

Cyber Security Cloud's Cloud-Based WAF "Shadankun" Has Been Adopted by More Than 1000 ...

TOKYO, April 9, 2020 /PRNewswire-PRWeb/ -- Cyber Security Cloud announced today that its cloud-based Web Application Firewall (WAF) service ...

Posted on 9 April 2020 | 10:11 am

Suspicious Application 2.1.2.3 Malware

Hello,. I'm sorry if my first msg on your forum is for asking help.. I made a rookie mistake and installed an unsecured software today, i realized it wasn't ...

Posted on 9 April 2020 | 10:11 am

Juniper Networks Releases Security Updates

Original release date: April 9, 2020

Juniper Networks has released security updates to address multiple vulnerabilities in various Juniper products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Juniper Security Advisories webpage and apply the necessary updates or workarounds.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 9 April 2020 | 10:09 am

IT expert: Don't cut cybersecurity spending because of COVID-19

Though some business owners may consider cutting spending on cybersecurity as a way to reduce costs during the COVID-19 crisis, one local IT ...

Posted on 9 April 2020 | 10:00 am

US doesn't need state privacy laws, it needs a federal one

While I appreciate the need for new legislation to strengthen data security practices and enable more consumer control over personal information, one ...

Posted on 9 April 2020 | 10:00 am

Back your CISO – it makes business sense

CISOs cannot just be called upon when there is an attack and cyber security's role in the business goes beyond reactivity. The CISO plays an important ...

Posted on 9 April 2020 | 10:00 am

Hackers, APTs Exploiting COVID-19 with Phishing Attacks, Fraud Schemes

Calling it a “fast-moving situation,” the cyber agencies provide both a summary of prominent attacks and mitigation techniques. “APT groups are using ...

Posted on 9 April 2020 | 9:59 am

Hackers, APTs Exploiting COVID-19 with Phishing Attacks, Fraud Schemes

... alert from the Department of Homeland Security Cybersecurity and Infrastructure Security Agency and UK National Cyber Security Centre (NCSC).

Posted on 9 April 2020 | 9:59 am

Hackers, APTs Exploiting COVID-19 with Phishing Attacks, Fraud Schemes

Hackers are leveraging ransomware and other malware through phishing lures, malware distribution, domain registration tied to COVID-19, and ...

Posted on 9 April 2020 | 9:59 am

Hackers, APTs Exploiting COVID-19 with Phishing Attacks, Fraud Schemes

... and Infrastructure Security Agency and UK National Cyber Security Centre ... “APT groups are using the COVID-19 pandemic as part of their cyber ...

Posted on 9 April 2020 | 9:59 am

Transport for London explains the importance of cyber security

Transport for London's Interim Chief Information Security Officer, Robert Orr, told us: “Managing the cyber security risks to TfL is essential at all times, not ...

Posted on 9 April 2020 | 9:48 am

Minimizing Risk Against Efforts To Expand Private Right of Action Provisions Under the CCPA

The CCPA does not provide any private right of action for a CCPA violation outside the data breach context, nor does it provide a private right of action ...

Posted on 9 April 2020 | 9:48 am

Transport for London explains the importance of cyber security

Transport for London's Interim Chief Information Security Officer, Robert Orr, told us: “Managing the cyber security risks to TfL is essential at all times, not ...

Posted on 9 April 2020 | 9:48 am

Bugcrowd Raises $30 Million in Series D Funding Round

Bug bounty platform provider Bugcrowd announced on Thursday that it has raised $30 million in a Series D funding round.

read more

Posted on 9 April 2020 | 9:47 am

Cyber Security for Your SMB

Learn what threats are coming at us and how to implement a multi-layered security approach to keep yourself safe. Fri, Apr 17, 2020 10:00 AM - 11:30 ...

Posted on 9 April 2020 | 9:46 am

Cyber Security for Your SMB

Learn what threats are coming at us and how to implement a multi-layered security approach to keep yourself safe. Fri, Apr 17, 2020 10:00 AM - 11:30 ...

Posted on 9 April 2020 | 9:46 am

Why Remote Collaboration Applications are the New Zero Day Frontier

Antivirus programs won't catch the zero days that threat actors will deploy against these platforms, leaving organizations exposed at a time when they ...

Posted on 9 April 2020 | 9:35 am

The Real Leadership Challenges Around Cyber Security

The security industry needs to pivot away from “talking about things” onto “getting things done”. The World Economic Forum's “Cyber Security Guide ...

Posted on 9 April 2020 | 9:26 am

The Real Leadership Challenges Around Cyber Security

The security industry needs to pivot away from “talking about things” onto “getting things done”. The World Economic Forum's “Cyber Security Guide ...

Posted on 9 April 2020 | 9:26 am

Zoom bombing: How hackers crash your online meetings and ways to prevent it

Some of those services include Google Hangout and Skype, but there's been a disturbing trend circulating for people who use Zoom. It's called Zoom ...

Posted on 9 April 2020 | 9:26 am

Web Application Firewall Market Big Growth in 2020 | Trustwave Holdings, Inc., Sophos Ltd ...

... and RFI and XSS, SQL injection. It's essential in blocking and shortening the vulnerabilities in window exposure. In addition its used for IoT (Internet ...

Posted on 9 April 2020 | 9:26 am

Survey: Realities of a Remote Workforce Increase Cybersecurity Concerns for Half of All Small ...

The overnight move to a “virtual workplace” has increased cybersecurity concerns for small business owners, but many still have not implemented ...

Posted on 9 April 2020 | 9:26 am

NJCCIC: Cyber Threats & Cybersecurity for Healthcare during COVID-19

To reduce the cybersecurity risk to healthcare organizations, the NJCCIC recommends the following best practices for users and administrators:.

Posted on 9 April 2020 | 9:15 am

NJCCIC: Cyber Threats & Cybersecurity for Healthcare during COVID-19

Reinforce security awareness principles and cybersecurity best practices for password security, email and Internet use, and incident reporting.

Posted on 9 April 2020 | 9:15 am

The Cybersecurity Risks of Going Remote (And How to Protect Your Company): Peter McClelland ...

... cyber-risk management company that provides tools for professionals to increase their clients' cybersecurity and privacy position and decrease risk.

Posted on 9 April 2020 | 9:03 am

Election security training goes online

An ambitious, Google-backed election security training initiative has had to adapt its plans during the pandemic by taking it online. — Internet voting is ...

Posted on 9 April 2020 | 9:03 am

Election security training goes online

So far, he said, Microsoft has seen 76 coronavirus-themed variants of these malware families. Hackers are also swapping out their infrastructure “on a ...

Posted on 9 April 2020 | 9:03 am

Q&A: ACI World discuss best practice for airport IT during Covid-19

NB: As far as cybersecurity goes, I don't think there's anything different now than what should be happening already. So, a robust cybersecurity ...

Posted on 9 April 2020 | 9:03 am

Election security training goes online

An ambitious, Google-backed election security training initiative has had to adapt its plans during the pandemic by taking it online. — Internet voting is ...

Posted on 9 April 2020 | 9:03 am

Election security training goes online

With help from Eric Geller, Martin Matishak and Zach Montellaro. Editor's Note: Morning Cybersecurity is a free version of POLITICO Pro ...

Posted on 9 April 2020 | 9:03 am

Will Today's Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft ...

Wind River says the singular architecture of its Helix Virtualization Platform for running embedded systems is more secure from cyber attack than the ...

Posted on 9 April 2020 | 8:52 am

Managing Modernization: Risks and Rewards of Digital Transformation in the Energy Sector

Traditionally, energy companies have relied on “air gapping” security ... 53% of respondents suffered business impact from a cyber-attack in the last ...

Posted on 9 April 2020 | 8:52 am

Will Today's Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft ...

Wind River says the singular architecture of its Helix Virtualization Platform for running embedded systems is more secure from cyber attack than the ...

Posted on 9 April 2020 | 8:52 am

GDPR penalties deferred as Covid-19 takes hold

"It's the reputational damage of having a data breach." So, will these extensions likely have any real impact on the future of data protection, data security ...

Posted on 9 April 2020 | 8:52 am

Travelex Paid Hackers Multimillion-Dollar Ransom Before Hitting New Obstacles

That is increasing computer networks' security risks, though breaches might not become known for weeks, or even months, as organized criminals ...

Posted on 9 April 2020 | 8:52 am

Will Today's Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft ...

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in ...

Posted on 9 April 2020 | 8:52 am

Travelex Paid Hackers Multimillion-Dollar Ransom Before Hitting New Obstacles

It responded by paying the hackers the equivalent of $2.3 million, according to a person familiar with the transaction. Travelex's payment of the ransom ...

Posted on 9 April 2020 | 8:52 am

Sayata Labs CEO: Cybersecurity guards are down

One criminal group was discovered by Alexander Urbelis, a cybersecurity expert and attorney with the New York-based Blackstone Law Group, ...

Posted on 9 April 2020 | 8:52 am

Avast Launches Security-Focused Browser for Android

Security solutions provider Avast this week announced the launch of an Android version of its Avast Secure Browser.

Previously available for Windows and macOS, the browser aims to provide users with increased security and privacy while navigating the Internet, shopping, or accessing their bank accounts on their Android devices.

read more

Posted on 9 April 2020 | 8:44 am

A new Marriott data breach exposed credentials of 5.2 million clients

Marriott International suffers a second massive data breach. Marriott data leak. Marriott International Inc., one of the largest hotel chains worldwide, ...

Posted on 9 April 2020 | 8:41 am

How ethical hacking can improve your security posture

Black hat hackers are cybercriminals motivated by personal or financial gain. They range from teenage amateurs to experienced individuals or teams ...

Posted on 9 April 2020 | 8:41 am

How ethical hacking can improve your security posture

Cybersecurity professionals see some threat actors or outside-parties as the enemy. However, challenging this mindset is important; you can better ...

Posted on 9 April 2020 | 8:41 am

Zoom hit by investor lawsuit as security, privacy concerns mount

Zoom has also formed a chief information security officer (CISO) Council to discuss security and privacy best practices; CISOs from HSBC, NTT Data ...

Posted on 9 April 2020 | 8:41 am

Working From Home Exposes New Billing Data Security Threats

April 09, 2020 - Organizations are facing significant data security risks as stay-at-home orders increase and the first major remote billing cycle is ...

Posted on 9 April 2020 | 8:30 am

Update: Coronavirus Cyberscams and Other Attacks – Scammers Are Still at It

Cyberattack on the Department of Health and Human Services (HHS) – The HHS is the lead federal agency for the COVID-10 pandemic response. It ...

Posted on 9 April 2020 | 8:30 am

Working From Home Exposes New Billing Data Security Threats

Companies whose employees are not properly set up for secure remote billing during the COVID-19 pandemic may face data security risks, according to ...

Posted on 9 April 2020 | 8:30 am

'Unkillable' Android malware can take over your phone: What to do

Back in October, we warned you of a particularly nasty strain of Android malware called xHelper that had already infected 45,000 phones and seemed ...

Posted on 9 April 2020 | 8:30 am

Cabinet Office at risk of further data breaches, review concludes

Data the department handles includes HR responsibilities for almost 8,000 employees and, from April 2020, security vetting. This involves processing ...

Posted on 9 April 2020 | 8:30 am

Update: Coronavirus Cyberscams and Other Attacks – Scammers Are Still at It

The malware then steals user credentials and other personal data. CovidLock Android Ransomware – A new type of ransomware promises Android ...

Posted on 9 April 2020 | 8:30 am

Working From Home Exposes New Billing Data Security Threats

Companies whose employees are not properly set up for secure remote billing during the COVID-19 pandemic may face data security risks, according to ...

Posted on 9 April 2020 | 8:30 am

China-backed hacking of the world's servers uncovered

Originally known as Research In Motion based in Waterloo Ontario, the company says its researchers have discovered how hackers have managed to ...

Posted on 9 April 2020 | 8:30 am

What we're learning about National Security from COVID-19

One is cyberattacks and someone exploiting the fact that people are distracted and there are also many more people getting online to find vulnerabilities ...

Posted on 9 April 2020 | 8:18 am

Cyber Security: More than just an IT issue

In an exclusive article for Security Matters, Andy Schofield explains why, in the ongoing battle against the cyber criminals, it's continually vital to ensure ...

Posted on 9 April 2020 | 8:18 am

Cyber Security: More than just an IT issue

In an exclusive article for Security Matters, Andy Schofield explains why, in the ongoing battle against the cyber criminals, it's continually vital to ensure ...

Posted on 9 April 2020 | 8:18 am

Cyber Security: More than just an IT issue

In an exclusive article for Security Matters, Andy Schofield explains why, in the ongoing battle against the cyber criminals, it's continually vital to ensure ...

Posted on 9 April 2020 | 8:18 am

Cyber Security: More than just an IT issue

In an exclusive article for Security Matters, Andy Schofield explains why, in the ongoing battle against the cyber criminals, it's continually vital to ensure ...

Posted on 9 April 2020 | 8:18 am

Coronavirus-themed phishing emails and websites spoof the White House

... cases, clicking on the link directed people to a hijacked Russian website with a Microsoft Word document containing macros that install malware.

Posted on 9 April 2020 | 8:18 am

Deception Technology Market - Growth, Trends, and Forecast (2020 - 2025)

Deception technology is an advanced security solution to detect and ... Human Services Department suffered a cyber-attack on its computer system, ...

Posted on 9 April 2020 | 8:18 am

Zoom Working on Security Improvements Amid More Bans

Zoom banned by many organizations

Zoom has promised to improve security and privacy, but an increasing number of organizations have decided to ban the video conferencing application over security concerns.

read more

Posted on 9 April 2020 | 8:07 am

Virtual cybersecurity conferences: An expanding list

With in-person events now impossible due to Covid-19, many organizations are taking their conferences virtual. Virtual security conferences... an ...

Posted on 9 April 2020 | 8:07 am

Working from home during the coronavirus pandemic creates new cybersecurity threats

Working remotely — and securely. Cybersecurity is a human problem: the person at the screen or keyboard is always the weakest point in any technical ...

Posted on 9 April 2020 | 8:07 am

UK and US Security Agencies Sound COVID-19 Threat Alert

Computer security teams must lock down work-from-home remote environments as quickly as possible, beginning by requiring two-factor authentication ...

Posted on 9 April 2020 | 8:07 am

Growth Hacking Strategies for Medical Animation Market with Report during year 2027 with Major ...

Medical animation is an educative video or documentary produced using 3D motion graphics to describe the mechanism of action (MoA) of a medical ...

Posted on 9 April 2020 | 8:07 am

Working from home during the coronavirus pandemic creates new cybersecurity threats

... ethical and even literary issues related to living a secure life online. I also teach on topics relating to application security and social engineering.

Posted on 9 April 2020 | 8:07 am

Deception Technology Market - Growth, Trends, and Forecast (2020 - 2025)

By altering the asymmetry of an attack, deception technology helps the security teams to focus on real threats to the network. The scenarios like these ...

Posted on 9 April 2020 | 8:07 am

Deception Technology Market - Growth, Trends, and Forecast (2020 - 2025)

By altering the asymmetry of an attack, deception technology helps the security teams to focus on real threats to the network. The scenarios like these ...

Posted on 9 April 2020 | 8:07 am

Bugcrowd vulnerability bounty platform snags $30 million in fresh funding round

The Series D round capitalizes on enterprise booking growth of 100%.

Posted on 9 April 2020 | 8:00 am

BlackBerry spots decade-long China-allied APT attack on Linux servers

The Canadian security software and service attributes the groups to civilian contractors sharing common tools and targeting information.

Posted on 9 April 2020 | 7:56 am

Malware spotlight: Sodinokibi

Sodinokibi is one of these strains of malware that needs to be taken seriously. Within four months of its discovery, it had managed to become the fourth ...

Posted on 9 April 2020 | 7:56 am

Bugcrowd Announces Record Growth, Secures $30 Million in Series D Funding

As attack vectors multiply at a pace that rivals those that exploit them, ... Broadened 24x7 cyber security team and support: expanded presence in ...

Posted on 9 April 2020 | 7:56 am

Serious cyber-security flaws uncovered in Ford and Volkswagen cars

The investigation showed that the 'infotainment' unit in the Volkswagen Polo, part of the car's 'central nervous system', was vulnerable to cyber-attack.

Posted on 9 April 2020 | 7:56 am

Serious cyber-security flaws uncovered in Ford and Volkswagen cars

It said the lack of “any meaningful regulation” for on-board tech in the motor industry allows manufacturers to be “careless with security”. It added that ...

Posted on 9 April 2020 | 7:56 am

Serious cyber-security flaws uncovered in Ford and Volkswagen cars

The investigation showed that the 'infotainment' unit in the Volkswagen Polo, part of the car's 'central nervous system', was vulnerable to cyber-attack.

Posted on 9 April 2020 | 7:56 am

Papadopoulos Denied that Trump Campaign Hacked DNC in Conversation with FBI Source in ...

Former Trump-campaign adviser George Papadopoulos in October 2016 denied the campaign was involved in the hacking of the Democratic National ...

Posted on 9 April 2020 | 7:56 am

Fleeceware apps discovered on the iOS App Store

More than 3.5 million iOS users installed 'fleeceware' apps from the Apple App Store.

Posted on 9 April 2020 | 7:55 am

New IoT botnet launches stealthy DDoS attacks, spreads malware

The malware is likely created by greek.Helios, which is a well-known botnet developer that advertises and sells DDoS services and botnet code ...

Posted on 9 April 2020 | 7:45 am

Bisq Hack: $250K Worth Of Crypto Stolen From Users

KEY POINTS. A hacker was able to exploit a flaw from Bisq exchange and wound up with $250,000 worth of cryptocurrencies; Trading was disabled on ...

Posted on 9 April 2020 | 7:22 am

Potent 'dark_nexus' IoT Botnet Emerges

A recently identified Internet of Things (IoT) botnet has modules developed in a manner that makes it significantly more “potent and robust” than other IoT botnets, Bitdefender’s security researchers say.

read more

Posted on 9 April 2020 | 7:15 am

Armorblox Achieves SOC 2 Type 2 Attestation

... Accountants (AICPA) practices, the audit certifies that Armorblox's information security practices, policies, procedures, and operations meet the SOC ...

Posted on 9 April 2020 | 7:11 am

Avast Mobile Browser For Android Launched With Imrpvoed Privacy, Security Features

Avast, known for its security and antivirus solutions, has rolled out the Android version of the Avast Secure Browser, which extends support beyond ...

Posted on 9 April 2020 | 7:11 am

Woman charged for falsely accusing astronaut ex-wife of hacking bank accounts from space

44 year-old Summer Worden has been indicted for falsely accusing NASA astronaut and estranged wife, Anne McClain, of hacking her bank account ...

Posted on 9 April 2020 | 7:00 am

Artificial Intelligence (AI) in Cyber Security Industry: 2020-2026 Global Market In-Depth Size, Status ...

Artificial intelligence is playing a crucial role in cyber security by identifying threats and protecting organizations' data from lethal cyber-attacks. It speeds ...

Posted on 9 April 2020 | 7:00 am

How Covid-19 will revolutionise SMEs' cyber security practices

The INPS website fiasco triggered a harsh rebuke from the Italian Data Protection Authority, which appears to be only an opening salvo as the media ...

Posted on 9 April 2020 | 7:00 am

Remove ScrSnap (Free Guide) - Removal Instructions

Malware spreading methods employed by hackers and virus developers. Hackers can spread their products via malicious email attachments because ...

Posted on 9 April 2020 | 6:37 am

Priming the Pump for Secure Storage

Like most network or storage system administrators, there are three core issues associated with data protection: privacy, information security and ...

Posted on 9 April 2020 | 6:37 am

Mobile Antivirus Market Set For Rapid Growth Over the Forecast Period 2025

Regal Intelligence has added latest report on Mobile Antivirus Market in its offering. The global market for Mobile Antivirus is expected to grow ...

Posted on 9 April 2020 | 6:34 am

Expert Reaction On Researchers Find Fraud Increasing

"Data security is tough to get right, but organizations need to take it extremely seriously more than ever before. " NYC Schools Ban Zoom – Cybersecurity ...

Posted on 9 April 2020 | 6:26 am

Artificial Intelligence (AI) in Cyber Security Market 2020-Global Key Players, Trends, Share ...

Artificial Intelligence (AI) in Cyber Security Market study presents an all in all compilation of the historical, current and future outlook of the market as ...

Posted on 9 April 2020 | 6:26 am

Pandemic – Evolution Of New Age Working

This imposition is possibly the reason why in March/April 2020 cyber ... from which they may draw information to maximize their security effectiveness.

Posted on 9 April 2020 | 6:26 am

Data Privacy In An Isolationist World

But data protection becomes even more complicated as the world becomes ... Check and adjust privacy settings in the privacy / security settings on ...

Posted on 9 April 2020 | 6:26 am

Early Impacts of COVID-19 on Homeland Security and Emergency Management Market - Exclusive ...

The cyber security segment is projected to register the highest CAGR during the forecast period. Cybersecurity solutions are categorized into six major ...

Posted on 9 April 2020 | 6:26 am

Expert Advise On Vulnerable VPNs Could Be Being Exploiting By Cybercriminals

Malicious cyber actors are taking advantage of the mass move to home ... More targeted than ever, these bad actors are ramping up their attack and ...

Posted on 9 April 2020 | 6:26 am

Box to Reduce Risk of Security Breaches and Cyber-Attacks With New Automated Malware ...

Enable safe preview and online editing of files in Box while displaying the security risk to end users; Automatically restrict downloading and sharing of ...

Posted on 9 April 2020 | 6:25 am

Box to Reduce Risk of Security Breaches and Cyber-Attacks With New Automated Malware ...

When malware is identified in Box, Box Shield will now automatically alert the end user, restrict downloads and sharing of malicious files, and notify IT ...

Posted on 9 April 2020 | 6:25 am

Bisq Bitcoin exchange slams on the brakes after exploit of critical security flaw, crypto theft

Over $250,000 in cryptocurrency has been stolen from users.

Posted on 9 April 2020 | 6:21 am

US, Britain Warn That Hackers Increasingly Use Coronavirus Bait

US and British cybersecurity agencies warned Wednesday that foreign government-backed hacking groups are using coronavirus themes to ply their way into computers and networks.

read more

Posted on 9 April 2020 | 6:10 am

Coronavirus-themed malware? Yes, there are already several strains

Coronavirus-themed malware? Yes, there are already several strains. About. Coronavirus-themed malware? Yes, there are already several strains.

Posted on 9 April 2020 | 6:10 am

Intego Mac Premium Bundle X9 review: Good for Macs, waiting for multi-OS improvements

Quite often major antivirus makers provide a stripped-down version of their Windows product with notable bells and whistles missing. Not so with ...

Posted on 9 April 2020 | 5:52 am

xHelper Android malware is still infecting phones and is 'unkillable'

Protect your Android devices by sticking to app stores and using antivirus. By Jim Martin, Editor Jim Martin | just now.

Posted on 9 April 2020 | 5:52 am

Intego Mac Premium Bundle X9 review: Good for Macs, waiting for multi-OS improvements

Intego's Mac malware protection is top notch. AV-Test most recently took a look at Intego in June 2019 when it earned a 100 percent detection rate for ...

Posted on 9 April 2020 | 5:52 am

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic

In our previous stories, you might have already read about various campaigns warning how threat actors are capitalizing on the ongoing coronavirus pandemic in an attempt to infect your computers and mobile devices with malware or scam you out of your money. Unfortunately, to some extent, it's working, and that's because the attack surface is changing and expanding rapidly as many

Posted on 9 April 2020 | 5:46 am

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms. Organisations set for a day of chaos on 14 April as vendors plan to fix ...

Posted on 9 April 2020 | 5:41 am

NSO Fires Back At Facebook, Says It's Not Responsible For Malware Deployments By Foreign ...

Facebook's lawsuit is questionable and if it wins, it would cause a lot of damage. Facebook is unhappy NSO software uses WhatsApp to deliver malware ...

Posted on 9 April 2020 | 5:32 am

Antivirus Software Market 2020- Global Industry Analysis, By Key Players, Segmentation ...

Market Overview The global Antivirus Software market size is expected to gain market growth in the forecast period of 2020 to 2025, with a CAGR of ...

Posted on 9 April 2020 | 5:30 am

Global Mobile Antivirus Market by global industry size, trend, share, profit, growth and key ...

The Mobile Antivirus report has some interesting key statistics on the market status of the manufacturers and it can your valuable source of guidance for ...

Posted on 9 April 2020 | 4:56 am

Video conferencing for teams and consumers: What is the right choice for you?

Though some claim that this forced “work from home” situation has shown that many of the discussions that previously required office meetings can actually be expedited simply by exchanging a few emails, there’s no doubt that, for some tasks, face-to-face meetings – even if over the internet – are a must. Which video conferencing solution should teams (organizations) use, and which consumers? Zoom Zoom Video Communications, the creators of the Zoom remote conferencing service, have … More

The post Video conferencing for teams and consumers: What is the right choice for you? appeared first on Help Net Security.

Posted on 9 April 2020 | 4:35 am

Serious Vulnerabilities Patched in Chrome, Firefox

Both Google and Mozilla released new versions of their browsers this week, addressing a variety of high-severity vulnerabilities, some of which could lead to remote code execution.

read more

Posted on 9 April 2020 | 4:31 am

Best Antivirus for PC Gaming in 2020

Therefore, dedicated antivirus software is something every PC gamer should opt to install, as it will effectively shield your PC from dangerous forms of ...

Posted on 9 April 2020 | 4:00 am

Latin America Antivirus Software Market 2020 Current Trends, Growth Prospects, Applications ...

The global Latin America Antivirus Software Market report presents an overview based on the historic data. Report provides market key segmentation ...

Posted on 9 April 2020 | 3:57 am

Complete Research Study on Enterprise Antivirus Software Market Analysis and Growth 2020 ...

The Enterprise Antivirus Software market size is predicted to witness enormous growth projections during 2019 -2025. The notable factors that are ...

Posted on 9 April 2020 | 3:15 am

US, UK Warn of Widespread Scanning for Unpatched VPNs, Citrix Vulnerability

Both nation state Advanced Threat Groups (APTs) and cyber criminals have ... This shows that hackers are already taken advantage of government ...

Posted on 9 April 2020 | 2:52 am

Cloudflare dumps reCAPTCHA as Google intends to charge for its use

Cloudflare says its moving to hCaptcha, an alternative CAPTCHA service, more private than reCAPTCHA.

Posted on 9 April 2020 | 2:46 am

CDC relaxes critical worker return to work guidelines

Dr. Robert Redfield, director of the Centers for Disease Control, announced a briefing on Wednesday at the White House Antivirus Headquarters.

Posted on 9 April 2020 | 2:07 am

Microsoft “friends” the Windows Explorer with Linux

... Microsoft's Insider Preview, the developers have added free access to files installed on Linux OS using the basic GUI of Windows Explorer. ... Yet the press service of the company has not announced when will release this update.

Posted on 9 April 2020 | 2:07 am

Investcorp acquired the German security firm Avira with a valuation of $ 180 million – Newsdio

Avira, a German-based cybersecurity company that provides antivirus, identity management, and other tools to both consumers and the private label of ...

Posted on 9 April 2020 | 1:33 am

German security firm Avira has been acquired by Investcorp at a $180M valuation

Avira, a cybersecurity company based out of Germany that provides antivirus, identity management and other tools both to consumers and as a ...

Posted on 9 April 2020 | 1:11 am

Know thy enemy: The evolving behaviors of today’s cybercriminals

Organizations in the energy/utilities, government, manufacturing, and healthcare sectors have witnessed an increase in cyberattacks over the past year. In fact, recent research found that nearly 1,000 government agencies and healthcare institutions experienced attacks in 2019. As these industries evolve and become more digitized, attackers have the opportunity to access more data than ever before. In order to understand cybercriminals’ motives and gameplay, we need to understand their evolving behaviors: Malware behaviors A recent example … More

The post Know thy enemy: The evolving behaviors of today’s cybercriminals appeared first on Help Net Security.

Posted on 9 April 2020 | 12:30 am

Zoom removes meeting IDs from app title bar to improve privacy

Zoom app won't show meeting ID in the title bar going forward to avoid accidental leaks and Zoom-bombing disruptions.

Posted on 9 April 2020 | 12:12 am

At the end of the first quarter, enterprises around the world were forced to send employees home ...

For those organisations looking to secure the business and the employee, LogMeIn's LastPass Identity suite provides easy to use password ...

Posted on 9 April 2020 | 12:03 am

What do CISOs want from cybersecurity vendors right now?

As COVID-19 spreads across the globe, what challenges are CISOs and other cybersecurity executives dealing with and what things they don’t want to be dealing with at the moment? The challenges According to the results of a recent YL Ventures survey, their main priority now is to establish fully remote workforces in as short a time as possible and as securely as possible. “Now is not the time to present CISOs with anything other than … More

The post What do CISOs want from cybersecurity vendors right now? appeared first on Help Net Security.

Posted on 9 April 2020 | 12:00 am

Third-party risk is broken, businesses unprepared for supply chain disruptions

Many companies are not dedicating proper resources to assess third-party risks, and those that are still lack confidence in their programs, according to Prevalent. Supply chain disruptions As a result, there are real consequences including loss of revenue, loss of productivity, and loss of reputation – all of which can jeopardize resiliency and are amplified given today’s supply chain concerns related to COVID-19. “Organizations are starting to ask the question about what happens to them … More

The post Third-party risk is broken, businesses unprepared for supply chain disruptions appeared first on Help Net Security.

Posted on 8 April 2020 | 11:30 pm

Want to Hack a Zoom Meeting During Coronavirus Pandemic? The FBI Dares You!

Charges may include: disrupting a public meeting, computer intrusion, ... and to exploit telework software vulnerabilities to obtain sensitive information.

Posted on 8 April 2020 | 11:07 pm

Want to Hack a Zoom Meeting During Coronavirus Pandemic? The FBI Dares You!

Charges may include: disrupting a public meeting, computer intrusion, using a computer to commit a crime, hate crimes, fraud, or transmitting threatening ...

Posted on 8 April 2020 | 11:07 pm

APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade

Five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and mobile devices running Android while remaining undetected for nearly a decade, according to BlackBerry. The report provides further insight into pervasive economic espionage operations targeting intellectual property, a subject that the Department of Justice recently said is the focus of more than 1000 open investigations in all of the 56 FBI field offices. Most large … More

The post APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade appeared first on Help Net Security.

Posted on 8 April 2020 | 11:00 pm

Pandemic driving global e-commerce growth, but fraud is on the increase too

The COVID-19 crisis is driving the global growth of e-commerce sales, with millions of consumers worldwide in quarantine shopping for goods, services and entertainment online. Transaction volumes in most retail sectors have seen a 74 percent rise in March compared to the same period last year, while online gaming has seen a staggering increase of 97 percent, according to analysis by ACI Worldwide of hundreds of millions of transactions from global online retailers. “During these … More

The post Pandemic driving global e-commerce growth, but fraud is on the increase too appeared first on Help Net Security.

Posted on 8 April 2020 | 10:30 pm

China-Linked Hackers Systematically Targeted Linux Servers for Years

Hackers Operating in the Interest of the Chinese Government Systematically Targeted Linux Servers, Windows Systems and Mobile Devices 

read more

Posted on 8 April 2020 | 10:06 pm

Workiva launches W for ESEF to help European companies simplify compliance

Workiva, provider of the world’s leading connected reporting and compliance platform, launched W for ESEF, a focused solution to help European companies simplify compliance with the European Securities and Markets Authority (ESMA) requirements for European Single Electronic Format (ESEF) reporting. W for ESEF – which is available in 23 European languages – offers a distinct subset of functionality for companies that want a targeted ESEF solution. Companies are able to build reports, tag data, manage … More

The post Workiva launches W for ESEF to help European companies simplify compliance appeared first on Help Net Security.

Posted on 8 April 2020 | 9:30 pm

Node enables companies to build AI into their applications, products, and business processes

Node announces the first ever self-service AI that enables companies of all sizes to build advanced artificial intelligence into their applications, products, and business processes. Node’s horizontal AI platform-as-a-service allows companies to use AI to make smarter business decisions, without the need for data science capabilities or significant capital investment. With Node, any company can now gain a competitive advantage with advanced prediction capabilities for market intelligence and resource planning, customer and talent retention, increased … More

The post Node enables companies to build AI into their applications, products, and business processes appeared first on Help Net Security.

Posted on 8 April 2020 | 9:00 pm

TransArmor Personal Data Protection from Fiserv tokenizes and encrypts personal data

Businesses can better secure customer data with a new solution from Fiserv, a leading global provider of payments and financial services technology solutions. TransArmor Personal Data Protection from Fiserv, which incorporates industry-leading data security technology from Protegrity, helps businesses secure consumers’ personal data. With TransArmor Personal Data Protection, businesses are able to encrypt and tokenize personal information that consumers provide to businesses during routine interactions, such as creating a customer account, enrolling in a promotion, … More

The post TransArmor Personal Data Protection from Fiserv tokenizes and encrypts personal data appeared first on Help Net Security.

Posted on 8 April 2020 | 8:30 pm

DataStax Enterprise 6.8: Advanced cloud-native data and bare-metal performance

DataStax announced the general availability of DataStax Enterprise (DSE) 6.8. DSE 6.8 adds new capabilities for enterprises to advance bare-metal performance, support more workloads, and enhance developer and operator experiences with Kubernetes. Built on the foundation of Apache Cassandra, DSE is the scale-out data infrastructure for enterprises that need to handle any workload on-premises and in any cloud on a continuously available, active-everywhere data platform. “DataStax Enterprise 6.8 has made significant advancements in performance, ops … More

The post DataStax Enterprise 6.8: Advanced cloud-native data and bare-metal performance appeared first on Help Net Security.

Posted on 8 April 2020 | 8:30 pm

Hackers have hit every country on Earth with coronavirus-themed cyberattacks

Microsoft Threat Protection, the company's suite of cybersecurity tools used to track and block threats, also found roughly 60,000 emails with ...

Posted on 8 April 2020 | 7:00 pm

Protecting yourself from hackers during COVID-19 pandemic

“A lot of our clients are small businesses who are having employees work from home, so they are very much at risk.” With most of the country working ...

Posted on 8 April 2020 | 5:07 pm

Working From Home? Here's Why You Need Dashlane

Using a password manager is your best bet. Dashlane utilizes two key technologies: Zero Knowledge Architecture and Dark Web Monitoring that not ...

Posted on 8 April 2020 | 5:07 pm

Hacking Groups Hunt Pandemic Opportunities, Warn US, British Officials

Coronavirus-releated phishing emails are among the digital threats authorities say are on the rise. Photo: Yui Mok/PA Wire/Zuma Press. By. Dustin Volz.

Posted on 8 April 2020 | 3:29 pm

Win32/Wacatac.C!ml - Windows Defender Can't Completely Remove

Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [645648 2019-10-05] (Oracle America, Inc.

Posted on 8 April 2020 | 2:45 pm

Win32/Wacatac.C!ml - Windows Defender Can't Completely Remove

I don't have any other antivirus software. I have in the past used Kapersky and Norton, and I hated both. I don't know what is out there that won't be as ...

Posted on 8 April 2020 | 2:41 pm

Accenture Acquires Critical Infrastructure Protection Firm Revolutionary Security

Accenture Expands OT Security Capabilities With Acquisition of Philadelphia-based Revolution Security

Consulting giant Accenture announced this week that it has acquired critical infrastructure protection firm Revolutionary Security for an undisclosed sum. 

read more

Posted on 8 April 2020 | 2:33 pm

Vulnerabilities in B&R Automation Software Facilitate Attacks on ICS Networks

Several vulnerabilities found by researchers in B&R Automation’s Automation Studio software make it easier for malicious actors to launch attacks inside operational technology (OT) networks. The vendor has started releasing patches.

read more

Posted on 8 April 2020 | 1:53 pm

Microsoft: Under 2% of all daily malspam uses COVID-19 lures

Malicious email campaigns have not increased due to COVID-19. Attackers merely changed lures.

Posted on 8 April 2020 | 1:31 pm

Global Mobile Antivirus Market 2020 NAlysis by Latest COVID19/CORONA Virus Impact with ...

Top Players Listed in the Mobile Antivirus Market Report are McAfee, Kaspersky, Webroot Secure, ESET, Bitdefender, F-Secure, Trend Micro, Lookout, ...

Posted on 8 April 2020 | 1:22 pm

Attacking the Organism: Telecom Service Providers

Securing the Massive Netwoks of Telecom Service Providers is a Major Challenge and Becoming More Complex

read more

Posted on 8 April 2020 | 12:50 pm

EXCLUSIVE: Coronavirus Interview With Virus Expert John McAfee

John McAfee is the founder of McAfee Antivirus. Read the interview below. TLR: If the Coronavirus were a computer virus, how would it affect your ...

Posted on 8 April 2020 | 12:37 pm

Internal NASA memo warns of "significantly increasing" threats from coronavirus-related hacking

"During the COVID-19 pandemic, NASA has seen an increased number of cyber threats that include phishing attempts and malware attacks. NASA ...

Posted on 8 April 2020 | 12:15 pm

Update Regarding Building Inspections

FaceTime (Apple OS devices), or Microsoft Teams (all devices) will be required to host the video call. Other software and hardware options will be ...

Posted on 8 April 2020 | 11:18 am

Antivirus Software Market 2020: Industry Analysis by Size, Share, Brand Strategy, Key Companies ...

The global Antivirus Software market report presents an overview of the market on the basis of key parameters such as market size, revenue, sales ...

Posted on 8 April 2020 | 10:56 am

A Healthy Dose of Common Sense

The post claims the U.S. government is creating an "antivirus" to the disease, which will contain an RFID chip so that the government will be able to ...

Posted on 8 April 2020 | 10:56 am

Mozilla Releases Security Updates for Firefox, Firefox ESR

Original release date: April 8, 2020

Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Mozilla Security Advisories for Firefox 75 and Firefox ESR 68.7 and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 8 April 2020 | 10:15 am

Google Releases Security Updates

Original release date: April 8, 2020

Google has released Chrome version 81.0.4044.92 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 8 April 2020 | 10:10 am

Password Manager Software Market 2020-2026 | Comprehensive Study COVID19 Impact Analysis ...

The Top players are LastPass, 1Password, Okta, Keeper, KeePass, Dashlane Business, RoboForm, TeamPassword, True Key, Enpass, Avatier, Thycotic ...

Posted on 8 April 2020 | 9:31 am

Password Manager Software Market 2020-2026 | Comprehensive Study COVID19 Impact Analysis ...

The Top players are LastPass, 1Password, Okta, Keeper, KeePass, Dashlane Business, RoboForm, TeamPassword, True Key, Enpass, Avatier, Thycotic ...

Posted on 8 April 2020 | 9:31 am

US, UK Issue Alert on Growing Use of Covid-themed Hacks

Advanced hacking groups seek to further “long-standing priorities” ... such as virtual private networks (VPNs), amplifying the threat to individuals and ...

Posted on 8 April 2020 | 9:16 am

Global Identity Management Software Market to Grow Significantly by 2020-2026 Focusing on ...

... OneLogin, Ping Identity, LastPass Enterprise, CA Technologies, Evolveum(MidPoint), IBM, CyberArk, Bitium, Intercede, Meldium, ADManager Plus, ...

Posted on 8 April 2020 | 9:06 am

Cisco Research Shows High Success Rate in Bypassing Fingerprint Authentication

Cisco has conducted a research project on bypassing fingerprint authentication systems and it achieved a success rate of roughly 80 percent, but the company’s experts were unsuccessful against Windows devices.

read more

Posted on 8 April 2020 | 8:38 am

Former Facebook CSO Alex Stamos to join Zoom as outside security consultant

Zoom also announces the creation of a CISO Council and Advisory Board to help its CEO through the current security and user privacy-related issues.

Posted on 8 April 2020 | 8:33 am

Government Warning: These 2500 COVID-19 Websites Pose A Threat To Your Online Safety

The agencies said they'd also detected hackers scanning for vulnerabilities and exploiting various popular tools that are supporting the rise in home ...

Posted on 8 April 2020 | 8:30 am

Hackers' New Target During Pandemic: Video Conference Calls

Ceri Weber had just begun to defend her dissertation when the chaos began: Echoes and voices interrupted her. Someone parroted her words. Then Britney Spears music came on, and someone told Weber to shut up. Someone threatened to rape her.

read more

Posted on 8 April 2020 | 8:08 am

Can fingerprint authentication on smartphones be fooled with 3D printing? Researchers find out

Extensive tests of optical, capacitance, and ultrasonic sensors have revealed interesting bypass rates.

Posted on 8 April 2020 | 8:00 am

NASA Sees Increase in Cyberattacks During Coronavirus Outbreak

A memo sent out this week to all NASA personnel warns that the agency has seen a significant increase in cyberattacks, including phishing and malware attacks, while its employees work remotely during the COVID-19 outbreak.

read more

Posted on 8 April 2020 | 7:18 am

350000 organizations remain vulnerable to Microsoft Exchange flaw

Despite that Microsoft shipped a patch in its Patch Tuesday on February 11 and urged admins to apply it without further delays, Microsoft Exchange ...

Posted on 8 April 2020 | 6:48 am

This is why the vicious xHelper malware resists factory wipes and reboots

The malware is a prime example of why you should not download apps from third-party sources.

Posted on 8 April 2020 | 6:42 am

Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild

Cybersecurity researchers have discovered a new emerging IoT botnet threat that leverages compromised smart devices to stage 'distributed denial-of-service' attacks, potentially triggered on-demand through platforms offering DDoS-for-hire services. The botnet, named "dark_nexus" by Bitdefender researchers, works by employing credential stuffing attacks against a variety of devices, such as

Posted on 8 April 2020 | 5:55 am

Internet Overseers Seek Crackdown on Coronavirus Website Scams

The agency that oversees online addresses on Tuesday called for those issuing website addresses to vigilantly thwart cyber scams exploiting coronavirus fears.

The Internet Corporation for Assigned Names and Numbers took the unusual step of firing off a letter to "registrars" entrusted with the business of issuing website names around the world.

read more

Posted on 8 April 2020 | 5:52 am

Security, Privacy Issues Found in Government COVID-19 Mobile Apps

Researchers at cybersecurity company ZeroFOX discovered that government-sanctioned COVID-19 mobile applications are affected by vulnerabilities and privacy issues that put citizens at risk.

read more

Posted on 8 April 2020 | 5:20 am

iCloud Keychain Alternatives: 5 of the Best

LastPass (Windows, macOS, Android, iOS, Browsers). LastPass is our top recommendation for best free password manager. And you may already be ...

Posted on 8 April 2020 | 3:04 am

iCloud Keychain Alternatives: 5 of the Best

1Password (Windows, Mac, iOS, Android). 1Password manager is our go-to recommendation for everyone who's looking for a decent premium ...

Posted on 8 April 2020 | 3:04 am

iCloud Keychain Alternatives: 5 of the Best

Dashlane (Windows, Mac, iOS, Android). Dashlane is another decent replacement for iCloud Keychain. It secures your passwords with strong and good ...

Posted on 8 April 2020 | 3:04 am

Dark_nexus botnet outstrips other malware with new, potent features

Researchers have found a botnet that borrows from Qbot and Mirai but goes much further in terms of power.

Posted on 8 April 2020 | 3:00 am

Tails, the security-focused OS, adds support for Secure Boot

Tails, an OS recommended by Edward Snowden, is now capable of booting on systems where UEFI Secure Boot is enabled.

Posted on 8 April 2020 | 2:57 am

DarkHotel APT is exploiting SangFor VPN vulnerability to target Chinese institutions, claims ...

Qihoo 360 suspects DarkHotel threat group to be behind this espionage ... Hackers also used watering hole attacks to infect victims' system with ...

Posted on 8 April 2020 | 2:41 am

Microsoft to add DANE and DNSSEC support to Exchange Online servers

Support for both protocols to roll out in two phases, with the last completing by the end of 2021.

Posted on 7 April 2020 | 11:58 pm

Ministries warned about expanding cyber threats, Zoom's security flaws | Malaysia

... it was documented that the NC4 had detected numerous treats which incorporate superior persistent threat (APT) assaults as perfectly as hacking of ...

Posted on 7 April 2020 | 9:01 pm

Increase in Exploited Zero-Days Shows Broader Access to Vulnerabilities

The number of identified zero-day vulnerabilities being exploited has increased in 2019, revealing a broadened access to these security flaws, according to security firm FireEye. 

read more

Posted on 7 April 2020 | 3:15 pm

Chrome 81 released with initial support for the Web NFC standard

Chrome 81 was initially scheduled for release on March 17, but delayed to today due to the COVID-19 outbreak.

Posted on 7 April 2020 | 2:38 pm

Free Security Tools, Resources Offered During Coronavirus Outbreak

Free security tools and resources during the coronavirus outbreak

read more

Posted on 7 April 2020 | 2:14 pm

Enterprise Content Firewall Provider Accellion Raises $120 Million

Enterprise content firewall provider Accellion on Tuesday announced that it has raised $120 million in a growth private equity round, which it will use for go-to-market initiatives, research and development, and mergers and acquisitions (M&A) plans.

read more

Posted on 7 April 2020 | 1:25 pm

Google backs Apple's SMS OTP standard proposal

Apple's proposal to standardize the format of SMS OTPs (one-time passcodes) moves to the WICG.

Posted on 7 April 2020 | 1:16 pm

Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset

Remember xHelper? A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices—making it nearly impossible to remove. xHelper reportedly infected over 45,000 devices last year, and since then, cybersecurity researchers have been trying to unfold how the malware survives factory reset and how it infected so many

Posted on 7 April 2020 | 8:48 am

Microsoft Buys Corp.com So Bad Guys Can’t

In February, KrebsOnSecurity told the story of a private citizen auctioning off the dangerous domain corp.com for the starting price of $1.7 million. Domain experts called corp.com dangerous because years of testing have shown whoever wields it would have access to an unending stream of passwords, email and other sensitive data from hundreds of thousands of Microsoft Windows PCs at major companies around the globe. This week, Microsoft Corp. agreed to buy the domain in a bid to keep it out of the hands of those who might abuse its awesome power.

Posted on 7 April 2020 | 7:34 am

Europol arrests man for coronavirus business email scam peddling masks, sanitizer

European police continue to fight criminal activity linked to the spread of COVID-19.

Posted on 7 April 2020 | 4:16 am

Secure Remote Working During COVID-19 — Checklist for CISOs

Coronavirus crisis introduces a heavy burden on the CISOs with the collective impact of a mass transition to working remotely coupled with a surge of cyberattacks that strive to monetize the general chaos. Security vendors, unintendedly, contribute to this burden by a relentless generation of noise in the form of attack reports, best practices, tips, and threat landscape analysis. Here we

Posted on 7 April 2020 | 3:49 am

Microsoft announces IPE, a new code integrity feature for Linux

Microsoft says IPE (Integrity Policy Enforcement) was designed for immutable and embedded systems (e.g. network firewall device in a data center).

Posted on 7 April 2020 | 2:43 am

New Zoom Hack Lets Hackers Compromise Windows and Its Login Password

Zoom has been there for nine years, but the immediate requirement of an easy-to-use video conferencing app during the coronavirus pandemic overnight made it one of the most favorite communication tool for millions of people around the globe. No doubt, Zoom is an efficient online video meeting solution that's helping people stay socially connected during these unprecedented times, but it's

Posted on 7 April 2020 | 2:09 am

Zoom Caught in Cybersecurity Debate — Here's Everything You Need To Know

Over the past few weeks, the use of Zoom video conferencing software has exploded ever since it emerged the platform of choice to host everything from cabinet meetings to yoga classes amidst the ongoing coronavirus outbreak and work from home became the new normal. The app has skyrocketed to 200 million daily users from an average of 10 million in December — along with a 535 percent increase

Posted on 7 April 2020 | 2:08 am

Email provider got hacked, data of 600,000 users now sold on the dark web

Italian email provider Email.it confirms security breach.

Posted on 6 April 2020 | 11:28 pm

Cyber Criminals Conduct Business Email Compromise through Exploitation of Cloud-Based Email Services, Costing US Businesses More Than $2 Billion

Posted on 6 April 2020 | 8:00 am

UK government slams ‘crackpot’ 5G-coronavirus theories following mast arson attacks

Suspected arson attacks have been connected to theories spreading online of 5G as a cause of coronavirus.

Posted on 6 April 2020 | 4:47 am

Mozilla Patches Critical Vulnerabilities in Firefox, Firefox ESR

Original release date: April 3, 2020

Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit these vulnerabilities to take control of an affected system. These vulnerabilities have been detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Mozilla’s security advisory for Firefox 74.0.1 and Firefox ESR 68.6.1 and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 3 April 2020 | 3:45 pm

Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment Data

Cybersecurity researchers today uncovered an ongoing new Magecart skimmer campaign that so far has successfully compromised at least 19 different e-commerce websites to steal payment card details of their customers. According to a report published today and shared with The Hacker News, RiskIQ researchers spotted a new digital skimmer, dubbed "MakeFrame," that injects HTML iframes into

Posted on 3 April 2020 | 5:52 am

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

If you use Apple iPhone or MacBook, here we have a piece of alarming news for you. Turns out merely visiting a website — not just malicious but also legitimate sites unknowingly loading malicious ads as well — using Safari browser could have let remote attackers secretly access your device's camera, microphone, or location, and in some cases, saved passwords as well. Apple recently paid a $

Posted on 3 April 2020 | 5:20 am

FBI Releases Guidance on Defending Against VTC Hijacking and Zoom-bombing

Original release date: April 2, 2020

The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).  Many organizations and individuals are increasingly dependent on VTC platforms, such as Zoom and Microsoft Teams, to stay connected during the Coronavirus Disease 2019 (COVID-19) pandemic. The FBI has released this guidance in response to an increase in reports of VTC hijacking.

The Cybersecurity and Infrastructure Security Agency encourages users and administrators to review the FBI article as well as the following steps to improve VTC cybersecurity:

CISA also recommends the following VTC cybersecurity resources:

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 2 April 2020 | 10:39 am

‘War Dialing’ Tool Exposes Zoom’s Password Problems

As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom. But without the protection of a password, there's a decent chance your next Zoom meeting could be "Zoom bombed" -- attended or disrupted by someone who doesn't belong. And according to data gathered by a new automated Zoom meeting discovery tool dubbed "zWarDial," a crazy number major corporations are setting up meetings without passwords enabled.

Posted on 2 April 2020 | 9:43 am

Cyber Actors Take Advantage of COVID-19 Pandemic to Exploit Increased Use of Virtual Environments

Posted on 1 April 2020 | 7:20 pm

MS-ISAC Releases Advisory on DrayTek Devices

Original release date: April 1, 2020

The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory regarding two vulnerable command injection points in DrayTek devices (CVE-2020-8515). An attacker could exploit these vulnerabilities to take control of an affected system. These vulnerabilities were detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review MS-ISAC Advisory 2020-043 and the DrayTek Security Advisory for CVE-2020-8515 and apply the necessary updates and mitigations.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 1 April 2020 | 12:24 pm

Google Releases Security Updates for Chrome

Original release date: April 1, 2020

Google has released Chrome version 80.0.3987.162 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 1 April 2020 | 9:48 am

WARNING: Hackers Install Secret Backdoor on Thousands of Microsoft SQL Servers

Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets Windows machines running MS-SQL servers to deploy backdoors and other kinds of malware, including multi-functional remote access tools (RATs) and cryptominers. Named "Vollgar" after the Vollar cryptocurrency it mines and its offensive "vulgar" modus operandi, researchers at Guardicore

Posted on 1 April 2020 | 8:02 am

Webinar — Autonomous Breach Protection: The New Security Paradigm Shift

Organizations today struggle with multi-product security stacks, that are expensive to purchase and maintain and also require a highly skilled security team to manually integrate and operate. The current Coronavirus crisis that has imposed a strict quarantine on organizations and security teams highlights the inherent weakness in relying on manual operation. This gives rise to a new security

Posted on 1 April 2020 | 6:57 am

Phish of GoDaddy Employee Jeopardized Escrow.com, Among Others

A spear-phishing attack this week hooked a customer service employee at GoDaddy.com, the world's largest domain name registrar, KrebsOnSecurity has learned. The incident gave the phisher the ability to view and modify key customer records, access that was used to briefly hijack domains for a half-dozen GoDaddy customers, including transaction brokering site escrow.com.

Posted on 31 March 2020 | 10:30 pm

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests

International hotel chain Marriott today disclosed a data breach impacting nearly 5.2 million hotel guests, making it the second security incident to hit the company in recent years. "At the end of February 2020, we identified that an unexpected amount of guest information may have been accessed using the login credentials of two employees at a franchise property," Marriott said in a

Posted on 31 March 2020 | 10:52 am

Annual Protest to ‘Fight Krebs’ Raises €150K+

In 2018, KrebsOnSecurity unmasked the creators of Coinhive -- a now-defunct cryptocurrency mining service that was being massively abused by cybercriminals -- as the administrators of a popular German language image-hosting forum. In protest of that story, forum members donated hundreds of thousands of euros to nonprofits that combat cancer (Krebs means "cancer" in German). This week, the forum is celebrating its third annual observance of that protest to "fight Krebs," albeit with a Coronavirus twist.

Posted on 30 March 2020 | 12:42 pm

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices. According to a report published by Check

Posted on 30 March 2020 | 9:17 am

AppTrana Offers Protection to Online Businesses During Coronavirus Outbreak

These are unprecedented times, and everyone is going through a testing period, with more than 3 billion people locked down all over the world. Businesses are scrambling to stay afloat and are forced to move digital in a very short span of time without much preparation. As these businesses move digital, cyber threats are more real than ever. Every day we are hearing news about hackers taking

Posted on 30 March 2020 | 7:22 am

Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks

Cybersecurity researchers with Qihoo 360's NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek. According to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities (CVE-2020-8515) affecting DrayTek Vigor

Posted on 29 March 2020 | 1:22 pm

Hackers Used Local News Sites to Install Spyware On iPhones

A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices. According to research published by Trend Micro and Kaspersky, the "Operation Poisoned News" attack leverages a remote iOS exploit chain to deploy a feature-rich implant called 'LightSpy' through links to local news websites, which

Posted on 27 March 2020 | 6:32 am

Watch Out: Android Apps in Google Play Store Capitalizing on Coronavirus Outbreak

Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use coronavirus-related keywords in their app names,

Posted on 27 March 2020 | 5:42 am

Russians Shut Down Huge Card Fraud Ring

Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring. Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the past decade. In a statement released this week, the Russian Federal Security Service (FSB) said 25 individuals were charged with circulating illegal means of payment in connection with some 90 websites that sold stolen credit card data.

Posted on 26 March 2020 | 12:28 pm

US Government Sites Give Bad Security Advice

Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Unfortunately, part of that message is misleading and may help perpetuate a popular misunderstanding about Web site security and trust that phishers have been exploiting for years now.

Posted on 25 March 2020 | 2:30 pm

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secure push notifications, and complete fraudulent transactions. The Android app, called "TrickMo" by IBM X-Force researchers, is under active development and has exclusively targeted German users

Posted on 25 March 2020 | 10:53 am

Apple Releases Security Updates

Original release date: March 25, 2020

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Apple security pages for the following products and apply the necessary updates:

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 25 March 2020 | 9:31 am

Adobe Releases Security Update for Creative Cloud Desktop Application

Original release date: March 25, 2020

Adobe has released a security update to address a vulnerability in Creative Cloud Desktop Application. An attacker could exploit this vulnerability to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Adobe Security Bulletin APSB20-11 and apply the necessary update.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 25 March 2020 | 9:24 am

Dozens of Android Apps for Kids on Google Play Store Caught in Ad Fraud Scheme

More than 50 Android apps on the Google Play Store—most of which were designed for kids and had racked up almost 1 million downloads between them—have been caught using a new trick to secretly click on ads without the knowledge of smartphone users. Dubbed "Tekya," the malware in the apps imitated users' actions to click ads from advertising networks such as Google's AdMob, AppLovin',

Posted on 25 March 2020 | 6:19 am

Critical RCE Bug Affects Millions of OpenWrt-based Network Devices

A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic. Tracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the

Posted on 24 March 2020 | 3:06 pm

How to Provide Remote Incident Response During the Coronavirus Times

While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes and verticals. IR providers face a unique challenge when approached by these organizations since, due to the Coronavirus mass quarantine, conducting incident response engagements by arriving physically to the customers' offices is

Posted on 24 March 2020 | 8:12 am

Microsoft RCE Vulnerabilities Affecting Windows, Windows Server

Original release date: March 23, 2020

Microsoft has released a security advisory to address remote code execution vulnerabilities in Adobe Type Manager Library affecting all currently supported versions of Windows and Windows Server operating systems. A remote attacker can exploit these vulnerabilities to take control of an affected system. Microsoft is aware of limited, targeted attacks exploiting these vulnerabilities in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Microsoft Advisory ADV200006 and the CERT Coordination Center (CERT/CC) Vulnerability Note VU#354840 for more information and apply the necessary mitigations until patches are made available.

This product is provided subject to this Notification and this Privacy & Use policy.

Posted on 23 March 2020 | 5:37 pm

Who’s Behind the ‘Web Listings’ Mail Scam?

In December 2018, KrebsOnSecurity looked at how dozens of U.S. political campaigns, cities and towns had paid a shady company called Web Listings Inc. after receiving what looked like a bill for search engine optimization (SEO) services rendered on behalf of their domain names. The story concluded that this dubious service had been scamming people and companies for more than a decade, and promised a Part II to explore who was behind Web Listings. What follows are some clues that point to a very convincing answer to that question.

Posted on 23 March 2020 | 3:17 pm

Warning — Two Unpatched Critical 0-Day RCE Flaws Affect All Windows Versions

Microsoft today issued a new security advisory warning billions of Windows users of two new critical, unpatched zero-day vulnerabilities that could let hackers remotely take complete control over targeted computers. According to Microsoft, both unpatched flaws are being used in limited, targeted attacks and impact all supported versions of the Windows operating system—including Windows 10, 8.1

Posted on 23 March 2020 | 2:18 pm

User Survey 2020 Report Shows Rapid Growth In Apache Pulsar Adoption

For the first time ever, the Apache Pulsar PMC team is publishing a user survey report. The 2020 Apache Pulsar User Survey Report reveals Pulsar's accelerating rate of global adoption, details how organizations are leveraging Pulsar to build real-time streaming applications, and highlights key features on Pulsar's product roadmap. Apache Pulsar is a cloud-native, distributed open source

Posted on 23 March 2020 | 4:10 am

Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices

A new version of the infamous Mirai botnet is exploiting a recently uncovered critical vulnerability in network-attached storage (NAS) devices in an attempt to remotely infect and control vulnerable machines. Called "Mukashi," the new variant of the malware employs brute-force attacks using different combinations of default credentials to log into Zyxel NAS, UTM, ATP, and VPN firewall

Posted on 21 March 2020 | 3:45 am

Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems

Multiple zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots. The findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day

Posted on 21 March 2020 | 3:39 am

Security Breach Disrupts Fintech Firm Finastra

Finastra, a company that provides a range of technology solutions to banks worldwide, said it was shutting down key systems in response to a security breach discovered Friday morning. The company's public statement and notice to customers does not mention the cause of the outage, but their response so far is straight out of the playbook for dealing with ransomware attacks.

Posted on 20 March 2020 | 11:52 am

Zyxel Flaw Powers New Mirai IoT Botnet Strain

In February, hardware maker Zyxel fixed a zero-day vulnerability in its routers and VPN firewall products after KrebsOnSecurity told the company the flaw was being abused by attackers to break into devices. This week, security researchers said they spotted that same vulnerability being exploited by a new variant of Mirai, a malware strain that targets vulnerable Internet of Things (IoT) devices for use in large-scale attacks and as proxies for other cybercrime activity.

Posted on 20 March 2020 | 9:46 am

FBI Sees Rise in Fraud Schemes Related to the Coronavirus (COVID-19) Pandemic

Posted on 20 March 2020 | 9:20 am

How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats

The Coronavirus is hitting hard on the world's economy, creating a high volume of uncertainty within organizations. Cybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has also shared a few ways to best prepare for the

Posted on 18 March 2020 | 12:04 pm

Coronavirus Widens the Money Mule Pool

With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more than their usual share of recruitable "money mules" -- people who get roped into money laundering schemes under the pretense of a work-at-home job offer. Here's the story of one upstart mule factory that spoofs a major nonprofit and tells new employees they'll be collecting and transmitting donations for an international "Coronavirus Relief Fund."

Posted on 17 March 2020 | 5:11 pm

Human Traffickers Continue to Use Popular Online Platforms to Recruit Victims

Posted on 16 March 2020 | 12:35 pm

Cyber Criminals Use Fake Job Listings To Target Applicants' Personally Identifiable Information

Posted on 21 January 2020 | 10:00 am

Oracle Critical Patch Update Advisory - January 2020

Posted on 14 January 2020 | 1:30 pm

WordPress 5.3.1 Security and Maintenance Release

WordPress 5.3.1 is now available! This security and maintenance release features 46 fixes and enhancements. Plus, it adds a number of security fixes—see the list below. WordPress 5.3.1 is a short-cycle maintenance release. The next major release will be version 5.4. You can download WordPress 5.3.1 by clicking the button at the top of this page, […]

Posted on 12 December 2019 | 6:07 pm

WordPress 5.2.4 Update

Late-breaking news on the 5.2.4 short-cycle security release that landed October 14. When we released the news post, I inadvertently missed giving props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where path traversal can lead to remote code execution. Simon has done a great deal of work on the WordPress […]

Posted on 18 November 2019 | 10:47 pm

Oracle Critical Patch Update Advisory - October 2019

Posted on 15 October 2019 | 2:30 pm

WordPress 5.2.4 Security Release

WordPress 5.2.4 is now available! This security release fixes 6 security issues. WordPress versions 5.2.3 and earlier are affected by these bugs, which are fixed in version 5.2.4. Updated versions of WordPress 5.1 and earlier are also available for any users who have not yet updated to 5.2. Security Updates Props to Evan Ricafort for finding an […]

Posted on 14 October 2019 | 4:54 pm

WordPress 5.2.3 Security and Maintenance Release

WordPress 5.2.3 is now available! This security and maintenance release features 29 fixes and enhancements. Plus, it adds a number of security fixes—see the list below. These bugs affect WordPress versions 5.2.2 and earlier; version 5.2.3 fixes them, so you’ll want to upgrade. If you haven’t yet updated to 5.2, there are also updated versions […]

Posted on 4 September 2019 | 8:51 pm

Mitigations Against Adversarial Attacks

This is the fourth and final article in a series of four articles on the work we’ve been doing for the European Union’s Horizon 2020 project codenamed SHERPA. Each of the articles in this series contain excerpts from a publication entitled “Security Issues, Dangers And Implications Of Smart Systems”. For more information about the project, […]

Posted on 11 July 2019 | 1:53 am

Adversarial Attacks Against AI

This article is the third in a series of four articles on the work we’ve been doing for the European Union’s Horizon 2020 project codenamed SHERPA. Each of the articles in this series contain excerpts from a publication entitled “Security Issues, Dangers And Implications Of Smart Systems”. For more information about the project, the publication […]

Posted on 11 July 2019 | 1:52 am

Malicious Use Of AI

This article is the second in a series of four articles on the work we’ve been doing for the European Union’s Horizon 2020 project codenamed SHERPA. Each of the articles in this series contain excerpts from a publication entitled “Security Issues, Dangers And Implications Of Smart Systems”. For more information about the project, the publication […]

Posted on 11 July 2019 | 1:50 am

Bad AI

This article is the first in a series of four articles on the work we’ve been doing for the European Union’s Horizon 2020 project codenamed SHERPA. Each of the articles in this series contain excerpts from a publication entitled “Security Issues, Dangers And Implications Of Smart Systems”. For more information about the project, the publication […]

Posted on 11 July 2019 | 1:49 am

Security Issues, Dangers, And Implications of Smart Information Systems

F-Secure is participating in an EU-funded Horizon 2020 project codenamed SHERPA (as mentioned in a previous blog post). F-Secure is one of eleven partners in the consortium. The project aims to develop an understanding of how machine learning will be used in society in the future, what ethical issues may arise, and how those issues […]

Posted on 8 July 2019 | 4:19 am

Sockpuppies!

Yesterday, a colleague of mine, Eero Kurimo, told me about something odd he’d seen on Twitter. Over the past few days, a number of pictures of cute puppies had shown up on his timeline as promoted tweets. Here’s an example: “Mainostettu” is the Finnish word Twitter uses to denote that a tweet has been promoted. […]

Posted on 1 July 2019 | 3:14 am

Oracle Security Alert for CVE-2019-2729 - 18 Jun 2019

Posted on 18 June 2019 | 5:00 pm

Live Coverage Of A Disinformation Operation Against The 2019 EU Parliamentary Elections

I recently worked with investigative journalists from Yle, attempting to uncover disinformation on social media around the May 2019 European elections. This work was also part of F-Secure’s participation in the SHERPA project, which involves developing an understanding of adversarial attacks against machine learning systems – in this case, recommendation systems on social networks. My […]

Posted on 24 May 2019 | 12:10 pm

Spam Trends: Top attachments and campaigns

Malware authors tend to prefer specific types of file attachments in their campaigns to distribute malicious content.  During our routine threat landscape monitoring in the last three months, we observed some interesting patterns about the attachment types that are being used in various campaigns. In February and March, we saw huge spam campaigns using ZIP […]

Posted on 8 May 2019 | 7:41 am

Oracle Security Alert for CVE-2019-2725 - 26 Apr 2019

Posted on 26 April 2019 | 12:00 pm

Oracle Critical Patch Update Advisory - April 2019

Posted on 16 April 2019 | 2:30 pm

Discovering Hidden Twitter Amplification

As part of the Horizon 2020 SHERPA project, I’ve been studying adversarial attacks against smart information systems (systems that utilize a combination of big data and machine learning). Social networks fall into this category – they’re powered by recommendation algorithms (often based on machine learning techniques) that process large amounts of data in order to […]

Posted on 3 April 2019 | 10:39 am

Mira Ransomware Decryptor

We investigated some recent Ransomware called Mira (Trojan:W32/Ransomware.AN) in order to check if it’s feasible to decrypt the encrypted files. Most often, decryption can be very challenging because of missing keys that are needed for decryption. However, in the case of Mira ransomware, it appends all information required to decrypt an encrypted file into the […]

Posted on 1 April 2019 | 9:19 am

A Hammer Lurking In The Shadows

And then there was ShadowHammer, the supply chain attack on the ASUS Live Update Utility between June and November 2018, which was discovered by Kaspersky earlier this year, and made public a few days ago. In short, this is how the trojanized Setup.exe works: An executable embedded in the Resources section has been overwritten by […]

Posted on 29 March 2019 | 9:12 am

Analysis of LockerGoga Ransomware

We recently observed a new ransomware variant (which our products detect as Trojan.TR/LockerGoga.qnfzd) circulating in the wild. In this post, we’ll provide some technical details of the new variant’s functionalities, as well as some Indicators of Compromise (IOCs). Overview Compared to other ransomware variants that use Window’s CRT library functions, this new variant relies heavily […]

Posted on 27 March 2019 | 12:19 pm

Analysis Of Brexit-Centric Twitter Activity

This is a rather long blog post, so we’ve created a PDF for you to download, if you’d like to read it offline. You can download that from here. Executive Summary This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 […]

Posted on 12 March 2019 | 2:56 am

WordPress 5.1.1 Security and Maintenance Release

WordPress 5.1.1 is now available! This security and maintenance release introduces 14 fixes and enhancements, including changes designed to help hosts prepare users for the minimum PHP version bump coming in 5.2. This release also includes a pair of security fixes that handle how comments are filtered and then stored in the database. With a maliciously […]

Posted on 11 March 2019 | 10:34 pm

Why Social Network Analysis Is Important

I got into social network analysis purely for nerdy reasons – I wanted to write some code in my free time, and python modules that wrap Twitter’s API (such as tweepy) allowed me to do simple things with just a few lines of code. I started off with toy tasks, (like mapping the time of […]

Posted on 21 February 2019 | 7:20 am

Oracle Critical Patch Update Advisory - January 2019

Posted on 15 January 2019 | 1:30 pm

NRSMiner updates to newer version

More than a year after the world first saw the Eternal Blue exploit in action during the May 2017 WannaCry outbreak, we are still seeing unpatched machines in Asia being infected by malware that uses the exploit to spread. Starting in mid-November 2018, our telemetry reports indicate that the newest version of the NRSMiner cryptominer, […]

Posted on 2 January 2019 | 11:04 pm

WordPress 5.0.1 Security Release

WordPress 5.0.1 is now available. This is a security release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. Plugin authors are encouraged to read the 5.0.1 developer notes for information on backwards-compatibility. WordPress versions 5.0 and earlier are affected by the following bugs, which are fixed in version […]

Posted on 12 December 2018 | 9:13 pm

Phishing Campaign targeting French Industry

We have recently observed an ongoing phishing campaign targeting the French industry. Among these targets are organizations involved in chemical manufacturing, aviation, automotive, banking, industry software providers, and IT service providers. Beginning October 2018, we have seen multiple phishing emails which follow a similar pattern, similar indicators, and obfuscation with quick evolution over the course […]

Posted on 26 November 2018 | 7:16 am

Ethics In Artificial Intelligence: Introducing The SHERPA Consortium

In May of this year, Horizon 2020 SHERPA project activities kicked off with a meeting in Brussels. F-Secure is a partner in the SHERPA consortium – a group consisting of 11 members from six European countries – whose mission is to understand how the combination of artificial intelligence and big data analytics will impact ethics […]

Posted on 22 November 2018 | 2:25 am

Spam campaign targets Exodus Mac Users

We’ve seen a small spam campaign that attempts to target Mac users that use Exodus, a multi-cryptocurrency wallet. The theme of the email focuses mainly on Exodus. The attachment was “Exodus-MacOS-1.64.1-update.zip” and the sender domain was “update-exodus[.]io”, suggesting that it wanted to associate itself to the organization. It was trying to deliver a fake Exodus […]

Posted on 2 November 2018 | 12:56 pm

Oracle Critical Patch Update Advisory - October 2018

Posted on 16 October 2018 | 2:30 pm

Oracle Security Alert for CVE-2018-11776 - 31 August 2018

Posted on 31 August 2018 | 7:00 pm

Value-Driven Cybersecurity

Constructing an Alliance for Value-driven Cybersecurity (CANVAS) launched ~two years ago with F-Secure as a member. The goal of the EU project is “to unify technology developers with legal and ethical scholars and social scientists to approach the challenge of how cybersecurity can be aligned with European values and fundamental rights.” (That’s a mouthful, right?) […]

Posted on 31 August 2018 | 8:20 am

Taking Pwnie Out On The Town

Black Hat 2018 is now over, and the winners of the Pwnie Awards have been published. The Best Client-Side Bug was awarded to Georgi Geshev and Rob Miller for their work called “The 12 Logic Bug Gifts of Christmas.” Georgi and Rob work for MWR Infosecurity, which (as some of you might remember) was acquired by F-Secure […]

Posted on 14 August 2018 | 6:58 am

Oracle Security Alert for CVE-2018-3110 - 10 August 2018

Posted on 10 August 2018 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2018

Posted on 17 July 2018 | 2:30 pm

WordPress 4.9.7 Security and Maintenance Release

WordPress 4.9.7 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9.6 and earlier are affected by a media issue that could potentially allow a user with certain capabilities to attempt to delete files outside the uploads […]

Posted on 5 July 2018 | 12:00 pm

Oracle Critical Patch Update Advisory - April 2018

Posted on 17 April 2018 | 2:30 pm

WordPress 4.9.5 Security and Maintenance Release

WordPress 4.9.5 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9.4 and earlier are affected by three security issues. As part of the core team's ongoing commitment to security hardening, the following fixes have been implemented […]

Posted on 3 April 2018 | 2:56 pm

WordPress 4.9.2 Security and Maintenance Release

WordPress 4.9.2 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. An XSS vulnerability was discovered in the Flash fallback files in MediaElement, a library that is included with WordPress. Because the Flash files are no longer needed for […]

Posted on 16 January 2018 | 5:00 pm

Oracle Critical Patch Update Advisory - January 2018

Posted on 16 January 2018 | 1:30 pm

WordPress 4.9.1 Security and Maintenance Release

WordPress 4.9.1 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9 and earlier are affected by four security issues which could potentially be exploited as part of a multi-vector attack. As part of the core team's […]

Posted on 29 November 2017 | 2:33 pm

Oracle Security Alert for CVE-2017-10269 - 13 November 2017

Posted on 13 November 2017 | 1:30 pm

Oracle Security Alert for CVE-2017-10151 - 27 October 2017

Posted on 27 October 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - October 2017

Posted on 17 October 2017 | 2:30 pm

Oracle Security Alert for CVE-2017-9805 - 22 September 2017

Posted on 22 September 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2017

Posted on 18 July 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2019

Posted on 16 July 2017 | 2:30 pm

Oracle Security Alert for CVE-2017-3629

Posted on 19 June 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2017

Posted on 18 April 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2017

Posted on 17 January 2017 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2016

Posted on 18 October 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2016

Posted on 19 July 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2016

Posted on 19 April 2016 | 2:30 pm

Oracle Security Alert for CVE-2016-0636 - 23 Mar 2016

Posted on 23 March 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2016

Posted on 19 January 2016 | 1:30 pm

Oracle Security Alert for CVE-2015-4852 - 10 November 2015

Posted on 10 November 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2015

Posted on 20 October 2015 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2015

Posted on 14 July 2015 | 2:30 pm

Oracle Security Alert for CVE-2015-3456 - 15 May 2015

Posted on 15 May 2015 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2015

Posted on 14 April 2015 | 2:30 pm

Oracle Security Alert for CVE-2016-0603 - 5 February 2016

Posted on 5 February 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - January 2015

Posted on 20 January 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2014

Posted on 14 October 2014 | 2:30 pm

Oracle Security Alert for CVE-2014-7169 - 26 September 2014

Posted on 26 September 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2014

Posted on 15 July 2014 | 2:30 pm

Oracle Security Alert for CVE-2014-0160 - 18 April 2014

Posted on 18 April 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2014

Posted on 15 April 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2014

Posted on 14 January 2014 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2013

Posted on 15 October 2013 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2013

Posted on 16 July 2013 | 2:30 pm

Oracle Java SE Critical Patch Update Advisory - June 2013

Posted on 18 June 2013 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2013

Posted on 16 April 2013 | 2:30 pm

Oracle Java SE Critical Patch Update Advisory - April 2013

Posted on 16 April 2013 | 2:30 pm

Oracle Security Alert for CVE-2013-1493 - 04 Mar 2013

Posted on 4 March 2013 | 1:30 pm

Updated Release of the Oracle Java SE Critical Patch Update - February 2013

Posted on 19 February 2013 | 1:30 pm

Oracle Java SE Critical Patch Update Advisory - February 2013

Posted on 1 February 2013 | 1:30 pm

Oracle Critical Patch Update Advisory - January 2013

Posted on 15 January 2013 | 1:30 pm

Oracle Security Alert for CVE-2013-0422 - 13 Jan 2013

Posted on 13 January 2013 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2012

Posted on 16 October 2012 | 2:26 pm

Oracle Java SE Critical Patch Update Advisory - October 2012

Posted on 16 October 2012 | 2:26 pm

Oracle Security Alert for CVE-2012-4681 - 30 Aug 2012

Posted on 30 August 2012 | 2:26 pm

Oracle Security Alert for CVE-2012-3132 - 10 Aug 2012

Posted on 10 August 2012 | 2:14 pm

Oracle Critical Patch Update (CPU) Advisory - July 2012

Posted on 19 July 2012 | 5:15 pm

Oracle Java SE Critical Patch Update Advisory - June 2012

Posted on 12 June 2012 | 3:00 pm

Oracle Security Alert for CVE-2012-1675

Posted on 30 April 2012 | 3:01 pm

Oracle Critical Patch Update (CPU) Advisory - April 2012

Posted on 18 April 2012 | 10:40 am

Oracle Java SE Critical Patch Update Advisory - February 2012

Posted on 14 February 2012 | 2:00 pm

Oracle Security Alert for CVE-2011-5035

Posted on 31 January 2012 | 3:20 pm

Oracle Critical Patch Update (CPU) Advisory - January 2012

Posted on 17 January 2012 | 2:44 pm

Oracle Critical Patch Update (CPU) Advisory - October 2011

Posted on 24 October 2011 | 1:33 pm

Oracle Security Alert for CVE-2011-3192

Posted on 15 September 2011 | 4:22 pm

Oracle Critical Patch Update (CPU) Advisory - July 2011

Posted on 19 July 2011 | 5:45 pm

Oracle Java SE Critical Patch Update Advisory - June 2011

Posted on 7 June 2011 | 5:18 pm

Oracle Critical Patch Update (CPU) - April 2011

Posted on 19 April 2011 | 3:00 pm

Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011

Posted on 15 February 2011 | 4:00 pm

Oracle Critical Patch Update (CPU) - January 2011

Posted on 18 January 2011 | 1:40 pm

Oracle Critical Patch Update (CPU) - October 2010

Posted on 12 October 2010 | 11:07 am

Oracle Critical Patch Update (CPU) - July 2010

Posted on 14 July 2010 | 2:35 pm

Oracle Critical Patch Update (CPU) - April 2010

Posted on 13 April 2010 | 4:01 pm

Oracle Security Alert for CVE-2010-0073 - February 2010

Oracle Security Alert for CVE-2010-0073

Posted on 4 February 2010 | 2:00 pm

Critical Patch Update - January 2010

Posted on 13 January 2010 | 12:05 pm

Critical Patch Update - October 2009

Posted on 20 October 2009 | 10:39 am

Critical Patch Update - July 2009

Posted on 15 July 2009 | 8:00 pm

Critical Patch Update - April 2009

Posted on 14 April 2009 | 5:40 pm

Critical Patch Update - January 2009

Posted on 14 April 2009 | 5:40 pm

Critical Patch Update - October 2008

Posted on 15 October 2008 | 1:53 pm

Critical Patch Update - July 2008

Posted on 15 July 2008 | 3:01 pm

Critical Patch Update - April 2008

Posted on 15 April 2008 | 5:13 pm

Critical Patch Update - January 2008

Posted on 15 January 2008 | 4:55 pm

Critical Patch Update - October 2007

Posted on 16 October 2007 | 3:47 pm

Critical Patch Update - July 2007

Posted on 17 July 2007 | 3:21 pm

Critical Patch Update - April 2007

Posted on 18 April 2007 | 10:57 am

Critical Patch Update - January 2007

Posted on 16 January 2007 | 5:35 pm

Critical Patch Update - October 2006

Posted on 17 October 2006 | 1:37 pm

Critical Patch Update - April 2006

Posted on 18 April 2006 | 3:42 pm

Critical Patch Update - January 2006

Posted on 17 January 2006 | 6:20 pm

Critical Patch Update - January 2005

Posted on 18 October 2005 | 5:28 pm

Critical Patch Update - April 2005

Posted on 18 October 2005 | 5:28 pm

Critical Patch Update - October 2005

Posted on 18 October 2005 | 5:25 pm

Critical Patch Update - July 2005

Posted on 12 July 2005 | 2:46 pm