Making Sense of Security

Securing your Digital World.

Making Sense of Security

Cybersecurity CEO: Identity Is A Beast, And The Foundation Of Security

The best way to secure your digital transformation – Robert Herjavec Los Angeles, Calif. – May 26, 2020 Not long ago if you had asked any security pro about how they protect their perimeter, they would have said – firewalls. In fact, when I started Herjavec Group over 15 years ago, we were the first firewall reseller in Canada! Today, the security landscape looks a lot different – especially with entire workforces forced to work remotely due to COVID-19. When my team was prepping for Herjavec Group’s 2020 Cybersecurity Conversations for the C-Suite report, I asked them a simple Read more…


Digital Defense Offers $1 Million In Free Ransomware Assessments To Aid Healthcare Providers

Cybersecurity vendor working with MSPs to help prevent vulnerabilities and cyberattacks during COVID-19 pandemic Press Release – Steve Morgan, Editor-in-Chief Sausalito, Calif. – May 16, 2020 Digital Defense is putting its money where its mouth is in order to help healthcare providers and hospitals in their time of need. Ransomware attacks on healthcare organizations were predicted to quadruple between 2017 and 2020, and to grow to 5X by 2021, according to a report from Cybersecurity Ventures. Digital Defense announced a free, $1 million dollar offer to help healthcare organizations prevent ransomware attacks and maintain focus on important, life-saving endeavors. Read more…


Cybercrime Bytes: Women In Cyber Up, Skills Gap Down, Undergrads Vs. Cyberscams

Weekly news that keeps you on the cutting edge of cybersecurity – Steve Morgan, Editor-in-Chief Sausalito, Calif. – May 18, 2020 This week’s rundown is sponsored by Arcserve – your source for smarter, easier data and ransomware protection.  — Women accounted for an estimated 20 percent of the cybersecurity workforce worldwide at the end of 2019, which has almost doubled in six years compared to the 11 percent in 2013, according to Cybersecurity Ventures. AMEinfo — It’s starting to look like the cybersecurity skills gap may shrink dramatically, going forward.  This is because security vendors are expanding their offerings Read more…


US Government Exposes North Korean Malware

US Cyber Command has uploaded North Korean malware samples to the VirusTotal aggregation repository, adding to the malware samples it uploaded in February. The first of the new malware variants, COPPERHEDGE, is described as a Remote Access Tool (RAT) “used by advanced persistent threat (APT) cyber actors in the targeting of cryptocurrency exchanges and related entities.” This RAT is known… The post US Government Exposes North Korean Malware appeared first on Security Boulevard. Article Link: https://securityboulevard.com/2020/05/us-government-exposes-north-korean-malware/ * This article was originally published here www.MakingSenseofSecurity.com


Beware Of GetYourStimulusCheck.com And Other Coronavirus-Themed Domains

The likely victims, and what they can lose – Jonathan Zhang, CEO at Whois XML API Walnut, Calif. – May 11, 2020 With people losing jobs and businesses closing shop due to the coronavirus pandemic, the U.S. government has decided earlier this year to release financial aid. This assistance comes in the form of a US$2-trillion monetary stimulus package with the implementation of the Coronavirus Aid, Relief, and Economic Security (CARES) Act. To date, some 88 million eligible Americans have received stimulus checks amounting to US$1,200 per individual. And as the government hints on giving out another round of Read more…


CISO 500 Demographic Study Announced By Cybersecurity Ventures

Analysis of Fortune 500 CISOs to be published in 2020 Sponsored by SPARQ Global – Steve Morgan, Editor-in-Chief Northport, N.Y. – Feb. 17, 2020 Cybersecurity Ventures has commenced research on our first-ever demographic study of Fortune 500 chief information security officers (CISOs), which will be published in 2020. The Fortune 500 is an annual list compiled and published by Fortune magazine that ranks 500 of the largest United States corporations by total revenue for their respective fiscal years. The list includes publicly held companies, along with privately held companies for which revenues are publicly available. The companies listed play a Read more…


Cybercrime Bytes: Social Engineering Up, New Kevin Mitnick Videos, Security As Code

Weekly news that keeps you on the cutting edge of cybersecurity – Steve Morgan, Editor-in-Chief Sausalito, Calif. – May 4, 2020 — Social engineering attacks (phishing, vishing, social media, etc.) have risen significantly during the COVID-19 pandemic. We have seen sharp rises in the registration of domain names used to masquerade as legitimate sites. These come in many forms: unexpected money or winnings, fake charity and medical scams, fake apps and even impersonation. Forbes — Five new original Kevin Mitnick short films have been released. The never before seen videos feature Mitnick sharing his favorite hack at age 16, Read more…


AuthSafe Launches To Prevent Account Takeovers

Podcast interview with the founder & CTO at SecureLayer7 – Steve Morgan, Editor-in-Chief Sausalito, Calif. – May 8, 2020 Sandeep Kamble got hacked when he was 17 years old. The experience led him to self-educate on information technology and cybersecurity. Today he’s a global entrepreneur with an exciting story in our space. For anyone stuck at home in need of a dose of inspiration, you can listen to his story on the Cybercrime Magazine podcast. In 2017, Kamble co-founded SecureLayer7, which today has a team of 50 employees providing cybersecurity services to public and private companies in the U.S., Read more…


Women in Cybersecurity (WiCyS) 2020 Conference Turns Into A Virtual Success

Lynn Dohm, Executive Director, shares the experience –Di Freeze, Managing Editor Northport, N.Y. – May 6, 2020 Lynn Dohm’s involvement in cybersecurity started in 2009 when she began working for the Center for Systems Security and Information Assurance (CSSIA), a National Science Foundation (NSF) grant in cybersecurity. “At that point, I discovered the innovative, fast-paced and forever-changing world of cybersecurity and was hooked ever since,” she said. From there, she worked with other NSF grants and nonprofits such as National CyberWatch Center, CyberWatch West and the National Cyber League. In 2014, a colleague dropped a flyer on her desk about Read more…


Cybersecurity’s Incredible Comeback; Industry Outpaces S&P 500 Recovery

Tracking the stock performance of pure play companies – Zsófia Boros Tel Aviv, Israel – May 5, 2020 “This is a ‘once in a generation’ depression,” we were told, as the 2008 Recession unfolded. Only a few years later, it became clear that we might need to brace ourselves for another freefall. We did not, however, predict that a pandemic-driven lockdown of this scale and endurance would serve as its impetus. The economy has now been in flux since February with a number of alarming dips and stock prices spiraling. Countless people have lost their jobs while those still Read more…


Probing News Media Disinformation On COVID-19; WHOIS PressTV.com?

Investigative exercise illustrates how to map the infrastructure of suspicious websites – Jonathan Zhang, CEO at Whois XML API Walnut, Calif. – Apr. 24, 2020 In spite of its tragic health, moral, and economic implications, the COVID-19 pandemic has become a rather lucrative business for cybercriminals. Various scammers have been attempting to trick panicking individuals into divulging their personal details or accessing malware-ridden websites in exchange for what they claim to be valid information. While that’s disheartening, scams and disinformation are other types of threats that Netizens will have to pay attention to in the next few months. Considering Read more…


Cybercrime Bytes: CISO 500 Data File, Hacking M&A, Motion Picture Cybersecurity

Weekly news that keeps you on the cutting edge of cybersecurity – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Apr. 27, 2020 This week’s rundown is sponsored by SmartBrief on Cybersecurity, your top resource for daily cybersecurity updates, delivered straight to your inbox.  — A beta version of the 2020 CISO 500 Data File from Cybersecurity Ventures has been released. This special compilation contains the CISO names at the 500 largest companies in the United States. The official file will be released in June 2020. Cybercrime Magazine — A company that’s been hacked is a less attractive acquisition target. Gartner Read more…


NXP’s CISO: Employees Fighting ‘Evil’ Will Shape The Future of Cybersecurity

Petri Kuivala on cybersecurity teams, COVID-19, and human risk – Barbara Babati, Marketing Manager at Hoxhunt Helsinki, Finland – Apr. 28, 2020 Petri Kuivala is a CISO with a unique background. Until 1999, he was a founding member of the IT crime investigation unit at the Helsinki police department. From there, he joined Nokia’s cybersecurity team in Finland and, after a few years, moved to China to lead Nokia Corporate Security. Between 2009 and 2011, Petri served as the first CISO of Nokia, from where his career led him to Microsoft after leading the integration of Nokia Security into Read more…


An old enemy – Diving into QBot part 2

Intro I hope everyone is healthy :-). I finally managed to find some time to continue my analysis of QBot. If you did not read my previous articles, I’ve already covered the packer[1] as well as the string decryption algorithm[2]. I’ve linked them both here. In this blog post I will cover the process execution chain that is happening before it even injects itself into the explorer.exe. I will talk about the anti analysis methods that are implemented into QBot and explain the injection process. Finally I finish off with a quick look at the unpacking routine being executed Read more…


Cybercrime Radio: Shark Tank’s Robert Herjavec, Girl Scouts’ CEO, $500K Phishing Victim

Who’s talking security on the Cybercrime Magazine podcast channel – Kayla Matthews Pittsburgh, Pa. — Apr. 20, 2020 Listen to all of the Cybercrime Magazine Podcasts here If you’re a regular reader, you likely depend on us to keep you updated on all the cybersecurity events worth attending. The COVID-19 pandemic — associated with more than 1.9 million infections so far — put in-person events on hold, so we’re now covering relevant podcasts for your in-home listening.  It’s crucial to stay abreast of ways to support your team during the coronavirus crisis. Since many or all of your employees may Read more…


Morrison says using COVID-19 tracing app a matter of ‘national service’

He doesn’t want to make it mandatory, but said doing so could help save someone’s life. Article Link: https://www.zdnet.com/article/morrison-says-using-covid-19-tracing-app-a-matter-of-national-service/#ftag=RSSbaffb68 * This article was originally published here www.MakingSenseofSecurity.com


10 Hot Cybersecurity Companies to Follow In May 2020

Who’s who fighting cybercrime – Kayla Matthews Pittsburgh, Pa. — Apr. 15, 2020 Special coverage of Cybercrime Magazine’s Hot 150 Cybersecurity Companies. To be secure today is to be cyber-secure. As you go into May 2020, you’ll want to stay up-to-date about the ever-evolving world of cybersecurity. If you’re uninformed, you’re likely vulnerable. Cyberthreats are growing every day, but so are the tools to defend against them. There are plenty of companies today that can help you with whatever your cybersecurity needs may be. Here are 10 cybersecurity companies to watch this May. 1. Bitglass If cloud security is Read more…


The Blame Game – About False Flags and overwritten MBRs

Let’s start right off with a short introduction: The Malware analyzed here is a so-called MBR (Master Boot Record) Locker. It is targeting (like most of the time) only PCs running Windows. The good news is: in this case there is neither encryption nor deletion happening on the file system and the MBR can be restored with Microsofts Bootrec Tool. A possible mitigation for suers woulds be running MBRFilter which is developed by Talos Intelligence. Now to the Message displayed in the VM below: Pressing CTRL+ALT+ESC for a possible bypass / failsafe to boot the OS (described in this Read more…


Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Akshay Bhargava, Chief Product Officer of Malwarebytes, about the similarities between coronavirus and computer viruses. We discuss computer virus prevention, detection, and response, and the simple steps that consumers and businesses can take today to better protect themselves from a spreading cyberattack. Tune in for all this and more on the latest episode of Lock and Code, with host David Ruiz. You can also find us on the Apple iTunes store, on Google Play Music, plus whatever Read more…


Ebfuscation: Abusing system errors for binary obfuscation

Introduction In this post I’m going to try to explain a new obfuscation technique I’ve come up with (at least I have not seen it before, please if there is documentation about this I would be grateful to receive it :D). First of all clarify that I am not an expert in obfuscation techniques and that some terms I use may not be correctly used. Software obfuscation is related both to computer security and cryptography. Obfuscation is closely related to stenography, a branch of cryptography that studies how to transfer secrets stealthily. Obfuscation does not guarantee the protection of Read more…


Cybersecurity M&A Report, Vol. 4, No. 1: Five Deals Worth $1 Billion+ Each Recorded In Early 2020

Tracking F5 Networks, Raytheon, Palo Alto Networks, LexisNexis, Accenture, and NSO – John P. Mello Jr. Northport, N.Y. – April 6, 2020 Cybersecurity Ventures tracks M&A deal flow covering startups, emerging players, and the largest tech vendors. Read on for activity in the most recent quarter. March Mar. 31. Defiance Ventures, of Charlotte, N.C., a venture capital firm, announces acquisition of Tavve, a cybersecurity and ITOA company based in Raleigh, N.C. Defiance CTO Kevin O’Dell says his company has a roadmap for Tavve to take its banking security solutions to the next level. Financial terms of the deal were undisclosed. Read more…


Fingerprint cloning: Myth or reality?

Fingerprint cloning: Myth or reality? PHONE, COMPUTER FINGERPRINT SCANNERS CAN BE DEFEATED WITH 3-D PRINTING

Phone, computer fingerprint scanners can be defeated with 3-D printing By Paul Rascagneres and Vitor Ventura. Executive summaryPasswords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. There are several kinds of biometric authentication, including retina scanning, facial recognition and fingerprint authentication, the most common one. Everyone’s fingerprints are unique,… This is only the beginning! Please visit the blog for the complete article. * This article was originally published here www.MakingSenseofSecurity.com


Blockchain Security Alert, – Blockchain

An attempt to login to your Blockchain wallet was made from an unknown browser. For your security your Blockchain hasbeen locked because of attempts to sign in exceeded the number allowed. To unlock your account,log on to this link below: Click HereIf this login attempt was not made by you it means someone visited your wallet login page from an unrecognised browser.It may be an indication you have been the target of a phishing attempt and might want to consi… * This article was originally published here www.MakingSenseofSecurity.com


AI filter launched to block Twitter cyberflashing

by John E Dunn It seems strange to report, yet a small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers. Does this sound a bit like street flashing harassment in digital form? It did to developer Kelsey Bressler after she received such an unsolicited image as a DM via Twitter last August. She later told the BBC: You’re not giving them a chance to consent, you are forcing the image on them, and that is never okay. Instead of shrugging it off, she and Read more…


Loncom packer: from backdoors to Cobalt Strike

990×400 The previous story described an unusual way of distributing malware under disguise of an update for an expired security certificate. After the story went out, we conducted a detailed analysis of the samples we had obtained, with some interesting findings. All of the malware we examined from the campaign was packed with the same packer, which we named Trojan-Dropper.NSIS.Loncom. The malware uses legitimate NSIS software for packing and loading shellcode, and Microsoft Crypto API for decrypting the final payload. Just as the earlier find, this one was not without its surprises, as one of the packaged samples contained Read more…


8 Things Users Do That Make Security Pros Miserable

When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive. 1 of 9 IT security would be so much easier were it not for users. To be specific, it would be easier if users didn’t insist on doing things with their computers and devices. Unfortunately for security teams, it’s hard to have a productive workforce if all they do is sit and stare at their lovely, perfectly safe computers, so security professionals have to constantly take into account users and Read more…


Malware and HTTPS – a growing love affair

by Paul Ducklin If you’re a regular Naked Security reader, you’ll know that we’ve been fans of HTTPS for years. In fact, it’s nearly nine years since we published an open letter to Facebook urging the social networking giant to adopt HTTPS everywhere. HTTPS is short for HTTP-with-Security, and it means that your browser, which uses HTTP (hypertext transport prototol) for fetching web pages, doesn’t simply hook up directly to a web server to exchange data. Instead, the HTTP information that flows between your browser and the server is wrapped inside a data stream that is encrypted using TLS, Read more…


Threat Analysis Unit (TAU) Threat Intelligence Notification: CoronaVirus Ransomware

“CoronaVirus” Ransomware has been found distributed via a phishing website. The malicious website will distribute a trojan downloader which then leads to downloading additional malicious payloads: the Kpot InfoStealer and Coronavirus Ransomware. “CoronaVirus” Ransomware will perform the deletion of volume shadow copies and overwrite the Master Boot Record (MBR) of the hard disk. It will also drop ransom notes named “CoronaVirus.txt” to the victim as shown in Figure 2. cv1.png999×176 Figure 1: Malware distribution   Figure 2: Screenshot of the ransom note Details Upon execution it will delete itself, then create a copy of itself to the %TEMP% directory Read more…


Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign. Operators of some older Tesla vehicles might be surprised to learn that a single piece of two-inch black electrical tape is all it takes to trick the camera sensor in their cars into misinterpreting a 35-mph speed sign as an 85-mph sign. Researchers at McAfee who discovered the issue said they were able to get a Tesla, equipped with version EyeQ3 of the Mobileye camera platform, to autonomously accelerate 50 miles above the speed limit. The Read more…


TP-Link RE200 aka AC750: Unpack, repack, validate image by md5 hashing and upload YOUR OWN version!

This article demonstrates how “easy” may be build a potentially malicious firmware. This way should be valid for EVERY TP-Link firmware header version 1 (identified by the very first 4 bytes in the header, in little endian!) A TP-Link RE200 is a widespread cheap Range Extender.I love having root shell on my devices, so long story short:I’ve started to decrypt RE200 config.bin (which I’ll publish soon), to find a vector to inject code and get a root shell.Unfortunatelly, for this time, the firmware is (not really, but enough) well written so I couldn’t see any code injection possibilities from the Read more…


Firmware Weaknesses Can Turn Computer Subsystems into Trojans

Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants. The software that acts as the interface between a computer and its various hardware components can be turned into an espionage-focused implant because the companies that make the components often fail to create a secure mechanism of updating the code, Eclypsium stated in an analysis released today. In its report, the enterprise firmware security company found that major turnkey design and manufacturing firms that supply components — such as Wi-Fi adapters, USB hubs, Read more…


Users Have Risky Security Habits, but Security Pros Aren’t Much Better

Researchers spot gaps in users’ and IT practitioners’ security habits, and between security tools and user preferences. Cybersecurity professionals, and the employees and consumers they serve, all engage in risky security practices. Data shows password issues continue to plague users of all experience levels, two-factor authentication adoption is lagging, and mobile devices are introducing new challenges. For the second “State of Password and Authentication Security Behaviors Report,” conducted by the Ponemon Institute and commissioned by Yubico, researchers polled 2,507 IT security practitioners and 563 individual users. In addition to learning the habits of cybersecurity pros, they wanted to see Read more…


Firms Improve Threat Detection but Face Increasingly Disruptive Attacks

In addition, more third parties are discovering the attacks rather than the companies themselves. Organizations are more quickly detecting attackers in their networks and systems, but the majority of attacks are still being found by third parties and not by internal security groups. In 2019, companies needed 56 days, on average, to detect an attacker in their networks, down from 78 days in 2018, FireEye Mandiant stated in its “M-Trends 2020” report, out today. While the improvement is partially due to companies spending more effort and resources on detecting threats and responding to incidents, much of the impetus to Read more…


Public health vs. personal privacy: Choose only one?

As the world turns to technology to track and contain the COVID-19 pandemic, could this sound the death knell for digital privacy? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity Article Link: http://feedproxy.google.com/~r/eset/blog/~3/rYoUT1a26mQ/ * This article was originally published here www.MakingSenseofSecurity.com


S2 Ep27: Bluetooth holes, dodgy Chrome extensions and forgotten passwords – Naked Security Podcast

by Alice Violet This week we discuss why Google abruptly pulled more than 500 Chrome extensions from its Web Store, the case of a man held in custody for refusing to decrypt two hard drives, and research detailing a number of security holes in Bluetooth chipsets. Greg Iddon plays host and producer this week and is joined by fellow Sophos experts Paul Ducklin and Peter Mackenzie. Listen now! LISTEN NOW Click-and-drag on the soundwaves below to skip to any point in the podcast. View Original Source Article HERE


Fake Smart Factory Honeypot Highlights New Attack Threats

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE


U.S. Gov Agency Targeted With Malware-Laced Emails

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE


EC-Council Announces Free Phishing-Protection Solution Amid The COVID-19 Outbreak

OhPhish Helps Remote Workers and Businesses Fight Phishing Attacks – From the Editors at Cybercrime Magazine ALBUQUERQUE, N.M., March 23, 2020 /ECCouncil.org/ As the novel coronavirus (COVID-19) pandemic progresses across the world, cybercriminals are taking advantage of the situation resulting in a spike of phishing scams on remote workforce and corporate systems. While working from home helps the cause of social distancing, it introduces additional risks to the organization. With less protection on home networks, employees are vulnerable to phishing attacks more than ever before. It is imperative that these employees remain vigilant and capable of protecting themselves from Read more…


More COVID-19 Themed Malware, (Sun, Mar 22nd)

Reader Andrew received a COVID-19 themed email with malicious attachment, and submitted the complete email. Article Link: https://isc.sans.edu/diary/rss/25930 * This article was originally published here www.MakingSenseofSecurity.com


All About SASE: What It Is, Why It’s Here, How to Use It

Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments. Secure access service edge, also known as SASE (pronounced “sassy”), is a term popping up more in security conversations as businesses grapple with the challenge of secure networking in the cloud. SASE combines WAN capabilities with network security functions: secure web gateway, cloud access security broker, firewall-as-a-service, and zero-trust network access. These capabilities are primarily delivered as-a-service and aim to find sensitive data or malware, decrypt content, and monitor risk and the trust level of sessions, Gartner’s Andrew Read more…


Emotet Malware Rears Its Ugly Head Again

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2020-9327PUBLISHED: 2020-02-21 In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations. CVE-2020-9329PUBLISHED: 2020-02-21 Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition. CVE-2020-7907PUBLISHED: 2020-02-21 In the JetBrains Scala plugin before 2019.2.1, some artefact dependencies were resolved over unencrypted connections. CVE-2019-18846PUBLISHED: 2020-02-21 OX App Suite through 7.10.2 allows SSRF. CVE-2012-1093PUBLISHED: 2020-02-21 The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during Read more…


NRC Health Ransomware Attack Prompts Patient Data Concerns

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed. A Feb. 11 ransomware attack targeting NRC Health has driven concerns about the security of patient data stored on the organization’s servers. NRC Health manages patient survey systems and works with 75% of the 200 largest hospital chains in the United States, CNBC reports. When it learned of the attack, NRC Health shut down its systems and has since been working to restore them, said chief information officer Paul Cooper in a statement. An email to its hospital clients explained how it Read more…


Facebook to Pay $550M to Settle Class Action Case Over Facial Recognition

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE


Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE


Zoom Fixes Flaw Opening Meetings to Hackers

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting. NEW ORLEANS – Enterprise video conferencing firm Zoom has issued a bevy of security fixes after researchers said the company’s platform used weak authentication that made it possible for adversaries to join active meetings. The issue stems from Zoom’s conference meetings not requiring a “meeting password” by default, which is a password assigned to Zoom attendees for what is calls a meeting room. If meeting creators do not enable a “meeting password,” the only thing securing the meetings are Meeting Read more…


Adobe fixes critical flaws in Media Encoder and After Effects

by John E Dunn After fixing a fat pile of critical security flaws as part of last week’s Patch Tuesday update, Adobe has come back with two more that need urgent attention. This is what’s called an out of band update, which means that a vulnerability is too risky or likely to be exploited to leave to the next scheduled update. The first is in the Windows and macOS versions of the After Effects graphics software and affects anyone running version 16.1.2 and earlier. Identified as CVE-2020-3765 after being reported to Adobe only days ago, the company offers little Read more…


Microsoft Leaves 250M Customer Service Records Open to the Web

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. View Original Source Article HERE


Cyber Fitness Takes More Than a Gym Membership & a Crash Diet

Make cybersecurity your top priority, moving away from addressing individual problems with Band-Aids and toward attaining a long-term cyber-fitness plan. Every year, millions of people make New Year’s resolutions to “get healthy.” Sadly, studies show that less than 25% of them actually stay committed to their resolutions past the end of January, and only 8% completely see them through. The reason is that crash diets and costly gym memberships are merely tactics, not long-term strategies. (It’s February. How are you doing with your resolutions?) The same is true for cyber fitness. Resolving to be more secure is worlds apart Read more…


Nearly half of hospital Windows systems still vulnerable to RDP bugs

by Danny Bradbury Almost half of connected hospital devices are still exposed to the wormable BlueKeep Windows flaw nearly a year after it was announced, according to a report released this week. The report, called 2020 Vision: A Review of Major IT & Cyber Security Issues Affecting Healthcare, comes from CyberMDX, which provides cybersecurity systems for hospitals. It says that 22% of a typical hospital’s Windows devices are exposed to BlueKeep. The proportion of Windows devices connected to a network that are vulnerable is far higher, at 45%, it adds. CyberMDX gathers these kinds of metrics via its own Read more…


Analyst Webcast: Women in Cybersecurity: A SANS Survey – March 17, 2020 1:00pm US/Eastern

Tuesday, March 17th, 2020 at 1:00 PM EST (17:00:00 UTC) Heather Mahalik Sponsors You can now attend the webcast using your mobile device! Overview Today, women are entering and rising through the ranks of cybersecurity experts, with more expected to join these ranks in coming years. By the end of 2019, women are expected to represent 20% of the global cybersecurity workforce, up dramatically from 2013, when only 11% of the workforce was female. At this webcast, survey author, forensic examiner and SANS instructor Heather Mahalik discusses key results of the survey of successful women in varied roles within Read more…