Login

Register

Login

Register

Day

February 3, 2020
by DH Kass • Feb 3, 2020 The House Homeland Security Committee has approved legislation that would give the Cyber and Infrastructure Security Agency (CISA) power to subpoena information from internet service providers on critical infrastructure vulnerabilities. The Cybersecurity and Vulnerability Identification and Notification Act of 2020 now goes to the full House for a...
Read More
AsianScientist (Feb. 4, 2020) – The convergence of the digital and physical worlds—a hallmark of the Fourth Industrial Revolution—requires a ‘glue’ to hold the many moving parts together. That ‘glue’ can take the form of the Internet of Things (IoT), connected devices that essentially record events in the physical realm and convert them into a...
Read More
Cloud bug condensed Researchers have documented how they discovered a critical vulnerability on the Microsoft Azure Cloud infrastructure. Code sanitization shortcomings posed a remote cloud execution risk in the Azure App Service before Microsoft addressed the problem last October. Microsoft acknowledged that the flaw was exploitable via Azure Cloud and Azure Stack. A write-up from...
Read More
Patrick Donahue, Bloomberg Published 10:46 am EST, Monday, February 3, 2020 Chancellor Angela Merkel’s efforts to rule out a ban on Huawei Technologies Co. have hit a wall of resistance in parliament. While the U.K. and the European Union introduced policies that allow Huawei’s partial participation in next-generation wireless networks, Merkel has failed to forge a...
Read More
The major topic that the New Orleans City Council faces at its monthly budget meeting is the hefty price tag of the Hard Rock Hotel collapse and cyberattack expenses, according to a list of costs associated with the disasters attached to the Tuesday meeting agenda.  The costs racked up since the Oct. 12 collapse of...
Read More
Ryan Permeh has been developing security solutions to protect endpoints for the bulk of his career. With BlackBerry’s acquisition of Cylance, he now gets to turn his focus to the kind of endpoint that can go up to 200 mph. With the rise of autonomous vehicles, there is an entirely new kind of inspiration for...
Read More
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here’s why. In the ever-escalating arms race between attackers and defenders, the latest defense to crumble under fire is two-factor authentication (2FA). Hackers have become increasingly successful in using social engineering techniques that defeat 2FA and let them take control...
Read More
‘Large private-equity firms, in particular, are said to be interested,’ Barron’s reports, but who’s driving the conversation–the company, news media or speculators? Brooke’s Note: Envestnet went public at $9 a share in 2010 to gain access to public markets that it could tap to fund the roll-up of a series of mostly software companies to...
Read More
Introduction When it comes to quickly making wide-ranging modifications to Windows systems, Group Policy is usually at the top of the list for ease-of use and raw power. The problem is that most people think of Group Policy as this all-encompassing voodoo that is only for large organizations and massive domains.  To be fair, those...
Read More
Enlarge / This refinery would be replaced by a green alternative once it reaches the end of its lifetime. Over the past five years, ransomware has emerged as a vexing menace that has shut down factories, hospitals, and local municipalities and school districts around the world. In recent months, researchers have caught ransomware doing something...
Read More
The gift card email scam targeting American rabbis and synagogues has reached communities from New York to Hawaii, with some incidents of congregants falling for the scheme. Three members of a Conservative synagogue in Virginia responded to emails they thought were from their rabbi by buying a collective $2,500 worth of gift cards. So far,...
Read More
Glenn Gerstell, former general counsel of the NSA Glenn Gerstell, who spent much of the last five years pounding a steady drumbeat warning of a global cyber pandemic, has left his job as general counsel at the U.S. National Security Agency. His last day was Jan. 31. Gerstell will be a senior adviser at the...
Read More
Only a few times in the history of hacking has a piece of malicious code been spotted attempting to meddle directly with industrial control systems, the computers that bridge the gap between digital and physical systems. Those rare specimens of malware have destroyed nuclear enrichment centrifuges in Iran and caused a blackout in Ukraine. Now,...
Read More
Watch Now to Learn Shellcoding from the Ground Up! In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often, and that is shellcode. What is shellcode? How do exploit developers create it and how do ethical hackers use it in their pentests, for research or even in CTF...
Read More
Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products. A fairly unsophisticated ransomware attack has raised a few eyebrows among security researchers for its ability to force computers to stop specific activities, or processes, related to industrial control systems, critical-infrastructure security firm Dragos stated in a...
Read More
The cybercriminal group TA505 has reportedly changed up its tactics again, now engaging in phishing campaigns that leverage attachments with HTML redirectors in order to deliver Excel documents containing malware. Following a short period of inactivity, the group, resumed activities last month with a scheme designed to get victims to install the information-stealing Trojan GraceWire,...
Read More
A Canadian man described as the second banana in the Silk Web dark web criminal operation is facing at least 20 years in prison. Roger Thomas Clark, 56, pleaded guilty last week in New York to a single charge of conspiracy to distribute narcotics. He was arrested four years ago in his Thailand lair. Silk...
Read More
There’s been a sharp increase in scans for vulnerable Nortek Linear Emerge E3 systems, SonicWall says. Attackers are actively trying to exploit a critical, previously disclosed command injection flaw in a door access-controller system from Nortek Security and Control LLC to use the device to launch distributed denial-of-service attacks (DDoS). SonicWall, which reported on the threat...
Read More
Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps. Security researchers have identified 24 Android applications seeking dangerous and excessive permissions, all of which come from app developers under Chinese company Shenzhen Hawk Internet Co., Ltd., and have a combined total of 382 million...
Read More
The challenge of protecting data in use is becoming more and more urgent as data leaks continue unabated. This urgent need is creating waves in the industry forcing key players to take action and initiatives that have already formed to make the move to confidential computing more achievable.  One of these initiatives is the Confidential Computing Consortium...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW