Resources

September 20, 2019
How much of the cybersecurity talent shortage is self-inflicted?

Money matters when it comes to recruiting cybersecurity staffers. But, beyond salary, a combination of factors have contributed to the widespread skills shortage, and some issues are worsened by the industry itself. Various studies suggest the shortage of qualified cybersecurity candidates is ...

September 20, 2019
World's most destructive botnet returns with stolen passwords and email in tow

By Dan Goodin Ars Technica 9/19/2019 If you've noticed an uptick of spam that addresses you by name or quotes real emails you've sent or received in the past, you can probably blame Emotet. It's one of the world's most costly and destructive botnets—and it just returned f...

September 20, 2019
In turnaround, McConnell backs $250 million in election security funding

Senate Majority Leader Mitch McConnell came out Thursday in support of providing states with an additional $250 million in election security funding, an abrupt turnaround after more than a year of......

September 20, 2019
State senator says courthouse break-ins were safety liability, calls on oversight committee to investigate

An Iowa state senator is calling on the legislative oversight committee to investigate at least two known county courthouse break-ins authorized by the Iowa judicial branch. Sen. Tony Bisignano (D-Des Moines),......

September 20, 2019
The Mysterious Death Of The Hacker Who Turned In Chelsea Manning

Debbie Scroggin and her husband live at the end of a series of gravel roads in a lonesome part of Kansas. It is the kind of place where, Debbie says, "you have to drive 15 minutes to get anywhere." Getting to the Scroggin house involves turning onto a......

September 18, 2019
Self-Help in Cyberspace: A Path Forward

Recent years have seen sustained calls to “unleash” the private sector to more assertively combat cyber threats. The argument has gained some sympathy in Congress, where Rep. Tom Graves (R-Ga.) recently reintroduced the Active Cyber Defense Certainty Act (ACDCA). As Bobby Chesney summarizes...

September 18, 2019
Vulns out of the box: 12 in 13 small biz network devices terribly insecure by default – research

By Tim Anderson The Register 17 Sep 2019 A new report has suggested that 12 out of 13 network devices, such as routers and network-attached storage appliances, are vulnerable to hacks that enable "root-privileged access without any authentication". Security consultants ISE took a loo...

September 18, 2019
PayID data breaches show Australia's banks need to be more vigilant to hacking

When we think of a bank robbery, we might imagine a safe with the door blown open. But nowadays it might be more accurate to picture criminals accessing our bank account online from another country. Bank robbers don’t need balaclavas and shotguns anymore. Australian......

September 18, 2019
The American way of cyber warfare and the case of ISIS

Many in the defense community have still not embraced hacking as a combat mission or the work of securing systems and networks transitioning from administrative job into warfighting function. This transformation has led to much theorization and debate, yet as a practical matter......

September 18, 2019
Millions of Americans' medical images and data are available on the Internet

By Jack Gillum, Jeff Kao and Jeff Larson PROPUBLICA 9/17/2019 Medical images and health data belonging to millions of Americans, including X-rays, MRIs, and CT scans, are sitting unprotected on the Internet and available to anyone with basic computer expertise. The records cover more than 5 mill...

September 16, 2019
China blamed for Australian parliament hack

Australian intelligence determined China was responsible for a cyber-attack on its national parliament and three largest political parties before the general election in May, five people with direct knowledge of the matter told Reuters. The Australian Signals Directorate (ASD) concluded in Mar...

September 16, 2019
Meet 'Simjacker, ' a nasty mobile vulnerability researchers say puts 1 billion phones at risk

A vulnerability in smartphone technology has made it possible for outsiders to conduct targeted surveillance against victims for the past two years, according to new security findings. Researchers from AdaptiveMobile Security said Thursday they found an SMS-based hacking technique that activel...

September 16, 2019
Men arrested for breaking into Dallas County Courthouse after judicial branch hires them to test 'vulnerability' of court records

Two men arrested for breaking into the Dallas County Courthouse told law enforcement they were hired to do so by the judicial branch. The men, outfitted with numerous burglary tools, told authorities they......

September 16, 2019
North Korean hacking groups hit with Treasury sanctions

The Department of the Treasury hit three North Korean groups with new sanctions Sept. 13 for conducting cyberattacks against critical infrastructure, including the infamous WannaCry ransomware attacks. Treasury's Office of Foreign Asset Control announced that Lazarus Group, an advanced pe...

September 16, 2019
NZ to fund NZ$10m to support Pacific cybersecurity strategy

The New Zealand government has announced it will provide NZ$10 million over five years to support Pacific countries as they develop national cybersecurity strategies to secure infrastructure and data, enhance online safety, and implement new cyber crime laws. Minister of Foreign Affairs Winston P...

September 21, 2019
7 Ways VPNs Can Turn from Ally to Threat

VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN....

September 20, 2019
HP Purchases Security Startup Bromium

The purchase will bring new isolation and threat intelligence capabilities to the HP portfolio....

September 20, 2019
Ransomware Strikes 49 School Districts & Colleges in 2019

The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019....

September 20, 2019
WeWork's Wi-Fi Exposed Files, Credentials, Emails

For years, sensitive documents and corporate data have been easily viewable on the coworking space's open network....

September 20, 2019
A Safer IoT Future Must Be a Joint Effort

We're just at the beginning of an important conversation about the future of our homes and cities, which must involve both consumers and many players in the industry...

September 20, 2019
Edge Feature Section

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book...

September 20, 2019
A Beginner's Guide to Microsegmentation

In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture....

September 19, 2019
Lion Air the Latest to Get Tripped Up by Misconfigured AWS S3

The breach, which reportedly exposed data on millions of passengers, is one of many that have resulted from organizations leaving data publicly accessible in cloud storage buckets....

September 19, 2019
Metasploit Creator HD Moore's Latest Hack: IT Assets

Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem....

September 19, 2019
California's IoT Security Law Causing Confusion

The law, which goes into effect January 1, requires manufacturers to equip devices with 'reasonable security feature(s).' What that entails is still an open question....

September 19, 2019
BSIMM10 Emphasizes DevOps' Role in Software Security

The latest model, with insights from 122 firms, shows DevOps adoption is far enough along to influence how companies approach software security....

September 19, 2019
Security Pros Value Disclosure ... Sometimes

Security professionals will coordinate disclosure with researchers but may keep their self-discovered vulnerabilities secret, a new study shows....

September 19, 2019
Deconstructing an iPhone Spearphishing Attack

How criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers. ...

September 19, 2019
Ping Identity Prices IPO at $15 per Share

The identity management company plans to sell 12.5 million shares, raising $187.5 million in its initial public offering....

September 19, 2019
Crowdsourced Security & the Gig Economy

Crowdsourced platforms have redefined both pentesting and the cybersecurity gig economy. Just not in a good way. ...

September 19, 2019
The 20 Worst Metrics in Cybersecurity

Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these....

September 18, 2019
Saudi IT Providers Hit in Cyber Espionage Operation

Symantec identifies new 'Tortoiseshell' nation-state group as the attackers....

September 18, 2019
WannaCry Detections At An All-Time High

More than 12,000 variants of the infamous malware are targeting systems that are still open to the EternalBlue exploit - but the potential danger is low, Sophos warns....

September 18, 2019
How Cybercriminals Exploit Simple Human Mistakes

A new report explores how attackers identify psychological vulnerabilities to effectively manipulate targets....

Discover how Cloudburst Security can support you.

CONTACT US