Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for The Internet Governa ...

 News

As the Internet approaches its fourth decade, it’s worth remembering that in that short amount of time, we’ve seen monumental, global change — both in the real world and, of course, in the digital one. With that in mind, the fifteenth Internet Governance Forum debates featured more than 200 sessions with   show more ...

focuses on data, the environment, inclusion, and trust. Because of COVID-19 concerns, it took place digitally this year, and this year’s roundtable discussion on Internet security included Eugene Kaspersky. In addition to Eugene talking about cybersecurity and transparency, the event included plenty of excellent debates. Some of the Kaspersky team, including Felix Aimé from the Global Research and Analysis Team (GReAT), discussed stalkerware, potential ways to address it, and how researcher teams (including ours) can raise awareness about the problem. To learn more about stalkerware, including what it is and how it works, check out the brilliant Coalition Against Stalkerware. Moving on from that, we have the hugely thorny issue of trust in the supply chain — and specifically, tackling the difficult task of ensuring trust in a worldwide supply chain. Throughout the event, the dedication of everybody involved — private entities, governments, and individual citizens — really stood out. They’re all working tirelessly toward a safer and more open Internet. We also held our Global Transparency Initiative event, examining trust, transparency, and the future — not to mention the idea that trust can be earned through openness and transparency; that the erosion of trust isn’t a given. Sadly, we’ve seen time and again stories about the fracturing Internet and what a balkanized Internet would mean for people and businesses around the world. The future doesn’t have to be that way.

 Trends, Reports, Analysis

With most of the workforce working from home, corporate resources are being made available via VPN and RDP connections. This has offered cybercriminals a plethora of opportunities for phishing attacks.

 Malware and Vulnerabilities

Various threat actors are on the lookout for exposed Environment (ENV) files that have been accidentally uploaded, and it is suspected that botnets are scanning these files for stored credentials.

 Trends, Reports, Analysis

The healthcare sector underwent major ransomware attacks this year. Ryuk itself accounted for 67.3 million attacks, with the most attacks on organizations in the healthcare sector.

 Govt., Critical Infrastructure

The Chinese embassy's rebuke came after India earlier this week expanded its ban to include another 43 Chinese apps, including AliExpress, DingTalk, MangoTV, and Taobao Live.

 Trends, Reports, Analysis

The finding was included in "The Great Cyber Surrender" report by Clario and Demos, created from the results of a survey of 2,000 people in the UK and the US about cybercrime and its impact.

 Trends, Reports, Analysis

A Group-IB report examines key shifts in the cybercrime world internationally between H2 2019 and H1 2020 and gives forecasts for the coming year, with ransomware causing most financial damage.

 Expert Blogs and Opinion

Don't ignore cyber operations outside U.S. and European interests, researcher says. We can learn a lot from methods used by attackers that aren't among the usual suspects.

 Malware and Vulnerabilities

Security specialists at Trend Micro found camouflaged malicious files named under legitimate software such as Notepad to evade detection in security solutions deployed on target systems and networks.

 Trends, Reports, Analysis

According to the findings from a survey by Generali Global Assistance, 30% of Americans avoided online shopping due to the potential security risks prior to the COVID-19 pandemic.

 Trends, Reports, Analysis

And as society continues to grapple with the impact of COVID-19, it is likely that these automated spear-phishing attacks will prey on fears around the pandemic, politics, and the economy.

 Malware and Vulnerabilities

According to the security vendor Digital Shadows, a plurality of Egregor victims come from the industrial goods and services sector (38%), and the vast majority so far (83%) have been US-based.

 Feed

Many of us here would love to turn hacking into a full-time career. To make that dream come true, you need to master your subject and earn some key certifications. To speed up this process, you might want to take a little guidance from the experts. Featuring 98 hours of content from top instructors, The Ultimate 2020 White Hat Hacker Certification Bundle is the ultimate launchpad for your career

 Feed

Three Nigerian citizens suspected of being members of an organized cybercrime group behind distributing malware, carrying out phishing campaigns, and extensive Business Email Compromise (BEC) scams have been arrested in the city of Lagos, Interpol reported yesterday. The investigation, dubbed "Operation Falcon," was jointly undertaken by the international police organization along with

 Podcast

Author and broadcaster Tim Harford joins us as we discuss the merits of robotic canine security guards, deepfakes, and the curious tale of an art forgery. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. And don't miss our special featured interview with James Moore from CultureAI.

2020-11
Aggregator history
Thursday, November 26
SUN
MON
TUE
WED
THU
FRI
SAT
NovemberDecemberJanuary