Skip to main content

Hackers Can Target ICS via Barcode Scanners | USCYBERCOM Issues Warning on Critical Palo Alto Vulnerability

CYBERCOM Warns Foreign Hackers Likely to Exploit Critical Palo Alto Networks Flaw | The Communication Imperative for CISOs
  Your SecurityWeek Briefing Webcasts
RSS Feed
06.30.20


Tuesday, June 30, 2020

Event

Detect. Investigate. Remediate. 24/7.

Red Canary delivers world-class detection and response at a fraction of the cost of building the capability in-house.

Learn More



The Communication Imperative for CISOs
As we look to the remainder of 2020 and where we should focus our attention, I encourage security leaders to take advantage of one of the few silver linings of the pandemic.
Read the Full Column
by Marc Solomon




Defending Your Budget: How to Show ROI of Cybersecurity Investments
Developing an ROI model takes time ñ my recommendation would be to focus on a simple security project that will return high value to the business when proven successful.
Read the Full Column
by Laurence Pitt



Non-Human Identities: The New Blindspot in Cybersecurity
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Read the Full Column
by Torsten George



New Reality of IT-OT: Convergence, Collaboration and Digital Transformation Acceleration
Itís very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Read the Full Column
by Galina Antova



To Err Is Human: Accepting Responsibility to Regain Confidence
Regardless of what goes wrong, the right attitude goes a long way towards helping stakeholders regain confidence in the security team and the security program it is running.
Read the Full Column
by Joshua Goldfarb



Navigating the Rapid Digital Shift: Ticket on the Bus, Not the Whole Bus
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
Read the Full Column
by Gunter Ollmann



SD-WAN Must Be Secure, Flexible, and Scale Across the Entire Enterprise
Smart businesses are learning that SD-WAN can play a critical role in quicklyóand securelyórolling out new networking environments, and connecting resources and users to data and applications.
Read the Full Column
by John Maddison



Strengthen Cybersecurity With These 3 Steps to Rapid Response
With capabilities to quickly curate and integrate new threat data sources across your operations, youíre prepared for whatever the future brings.
Read the Full Column
by Marc Solomon




3 Ways Effective OT Security Enables Your Business
When your core business operations, digital transformation initiatives and workersí ability to do their jobs are at risk, effective OT security must become just as ubiquitous.
Read the Full Column
by Galina Antova




Realizing the Potential of AI-Driven Security Operations
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Read the Full Column
by John Maddison



Protecting Online Retail in the Face of COVID-19 and Beyond
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Read the Full Column
by Laurence Pitt




On the Rise: The Enemy From Within
Today's economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Read the Full Column
by Torsten George



Seven Ways to Improve Efficiency in Your Security Metrics Program
Most security organizations realize that, regardless of how much progress they've made towards improving maturity and efficiency, there is still more work to be done.
Read the Full Column
by Joshua Goldfarb



Why You May Not Need to Monitor the Dark Web
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Read the Full Column
by Idan Aharoni




Data is the Key to Understand Whatever Life Brings
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Read the Full Column
by Marc Solomon



Beware of Sick Behavior Masquerading as Coronavirus
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Read the Full Column
by Alastair Paterson




Three Tips to Help CISOs Close the IT-OT Security Gap, Part 2
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Read the Full Column
by Galina Antova




See All Recent Articles at SecurityWeek.Com

Researchers Show How Hackers Can Target ICS via Barcode Scanners: Researchers show how hackers could target industrial control systems using barcode scanners. Read More

CYBERCOM Says Foreign Hackers Likely to Exploit Critical Palo Alto Networks Flaw: Palo Alto Networks has patched a critical authentication bypass vulnerability in PAN-OS and US Cyber Command believes foreign APTs will likely attempt to exploit it soon. Read More

Data Stolen From 945 Websites Emerges on Dark Web: SQL databases allegedly stolen from 945 websites have emerged on the Dark Web, potentially impacting tens of millions of people. Read More

TikTok Denies Sharing Indian User Data With Chinese Govt: TikTok denies sharing Indian users' data with the Chinese government, after New Delhi banned the wildly popular app in a sharp deterioration of relations with Beijing two weeks after a deadly border clash. Read More

Threat Hunting Firm Hunters Raises $15 Million in Series A Round: Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. Read More

Verizon, PayPal, Uber Paid Out Most Through Bug Bounty Programs on HackerOne: HackerOne has released a list of the companies that have paid out the most money through their bug bounty programs. Read More

After Deadly Clash, India Bans 59 Chinese Mobile Apps Over 'Security': India has banned 59 Chinese mobile apps, including the wildly popular TikTok and WeChat, over national security and privacy concerns two weeks after a deadly Himalayan border clash between the nuclear-armed neighbours. Read More

Australia Ramps Up Cyber Spending After State-Backed Attacks: Australia unveiled the "largest-ever" boost in cybersecurity spending, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. Read More

Driver Vulnerabilities Facilitate Attacks on ATMs, PoS Systems: Driver vulnerabilities can facilitate attacks on ATMs, PoS systems and other devices, warns firmware security company Eclypsium. Read More

Pre-Emptive Anti-Phishing Firm Area 1 Security Raises $25 Million: Redwood, California-based anti-phishing firm Area 1 Security has raised $25 million in a Series D funding round led by ForgePoint Capital. Read More

Russian Pleads Guilty for Role in Cybercrime Organization: A Russian national pleaded guilty last week for his role in an international cyber theft ring that caused losses of more than $568 million. Read More

Magecart Hackers Target U.S. Cities Using Click2Gov: Magecart web skimmers were found on the websites of eight cities in the United States and one thing they have in common is that they all use the Click2Gov platform. Read More

Honeywell Adds New Features to Forge Cybersecurity Platform: Honeywell announced recently that it has added several new features to its Forge cybersecurity platform. Read More

UCSF Pays Cybercriminals $1.14 Million to Recover Files After Ransomware Attack: University of California San Francisco (UCSF) revealed that it paid roughly $1.14 million to cybercriminals to recover data encrypted during a ransomware attack earlier this month. Read More

Breach Protection Company Cynet Raises $18 Million in Series B+ Funding Round: Breach protection solutions provider Cynet has raised $18 million in a Series B+ funding round, which brings the total raised by the company to $38 million. Read More

Security Breach Impacts State Police Database: A data breach has impacted Maine State Policeís information sharing database for federal, state and local law enforcement officials, the agency confirmed late Friday. Read More

Turf Battles and Silo Skirmishes Are Killing SOC Effectiveness: Survey: Many companies view the SOC as a key part of their security strategy, but SOC staff complain about high stress and the lack of proper tools. Read More

Tens of U.S. Businesses Targeted With WastedLocker Ransomware: At least 31 organizations in the United States have been targeted with the recently detailed WastedLocker ransomware. Read More

Russian Cybercriminal Gets 9 Years for Online Fraud Website: A Russian computer hacker who facilitated $20 million in credit card fraud and ran a sophisticated clearinghouse for international cybercriminals was sentenced to nine years in prison. Read More

Hybrid Malware 'Lucifer' Includes Cryptojacking, DDoS Capabilities: A recently identified piece of cryptojacking malware includes the necessary functionality to launch DDoS attacks. Read More

Man Convicted of Stealing High Tech Trade Secrets for China: A U.S. judge convicted a Chinese national of economic espionage, stealing trade secrets and engaging in a conspiracy for the benefit of his countryís government. Read More

Salesforce Ventures Investment Values Tanium at $9 Billion: Tanium and Salesforce have come together in a strategic relationship to help solve one of today's most compelling and urgent problems: how does security manage a workforce that has migrated from in-house company desktops to remote personal devices. Read More

Hackers Target Online Stores With Web Skimmer Hidden in Image Metadata: A group of cybercriminals managed to hide their web skimmer in the EXIF metadata of an image that was then surreptitiously loaded by compromised online stores. Read More

Hackers Threaten to Leak Files Stolen From Australian Beverage Firm Lion: Australian beverage company Lion says there is no evidence that hackers have stolen information from its systems, but the hackers claim they have and are threatening to leak it. Read More

Data Privacy, Other Measures Qualify for California Ballot: California voters will weigh in this November on whether to expand a landmark data privacy law, alter a decades-old law that limits property taxes on businesses and exempt ride-hail giants Uber and Lyft from a new state labor law. Read More

NVIDIA Patches Code Execution Flaws in GPU Drivers: NVIDIA this week released patches for a dozen vulnerabilities in GPU display drivers and vGPU software, including multiple issues that could lead to code execution. Read More

IBM Discloses Tenda Powerline Extender Flaws Apparently Ignored by Vendor: IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. Read More

Siemens Acquires System-on-Chip Analytics Company UltraSoC: Siemens this week announced that it is acquiring UltraSoC Technologies, a provider of analytics and monitoring solutions for SoCs. Read More

Police Raids Target Users of Illegal Online Forum in Germany: Police in Germany have arrested 32 people and detained 11 after nationwide raids targeting users of an illegal online platform. Read More

Developer of DDoS Botnets Based on Mirai Code Sentenced to Prison: A man who developed distributed denial of service (DDoS) botnets based on the source code of Mirai was sentenced to 13 months in federal prison. Read More

US Cybercom Virtual War Game Girds Against Increased Threats: Foreign hackers are taking advantage of the coronavirus pandemic to undermine institutions and threaten critical infrastructure, a top U.S. military cyber official said Thursday, June 25, 2020. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2020 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...