Skip to main content

Twitter Names New CISO | Russian Gets Prison for Hacking LinkedIn, Dropbox

Cisco Patches Actively Exploited Flaws in Carrier-Grade Routers
  Your SecurityWeek Briefing Webcasts
RSS Feed
09.30.20


Wednesday, September 30, 2020


Event

Make Your Vendor Lifecycle More Efficient

If bringing new vendors into your company's network is not as simple as you need it to be, now is the time to change up your TPRM program. Changes in three key areas can result in a more efficient program using the same resources you already have.

Read the eBook



Takeaways From the Shopify Hack
The risk of company employees walking away with sensitive data or selling their access credentials has never been greater now that a record number of individuals have been laid off.
Read the Full Column
by Idan Aharoni



How Security Programs Are Changing After COVID-19: Maximizing Resiliency
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered "priorities" before March are not really priorities.
Read the Full Column
by Galina Antova



So Wait, What Exactly IS the Dark Web?
Speak with security professionals who are involved in monitoring the Dark Web and you will probably end up getting varied responses as to what it is and what it is comprised of.
Read the Full Column
by Idan Aharoni




Enterprise Threat Visibility Versus Real-World Operational Constraints
The phrase "assume breach" has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
Read the Full Column
by Gunter Ollmann



The Crucial Component of Detection and Response: Intelligence Pivoting
While it may be a trendy term, in cybersecurity, intelligence pivoting is pivotal to detection and response.
Read the Full Column
by Marc Solomon




How Self-Doubt Can Keep Your Security Team Sharp
A healthy dose of self-doubt can go a long way towards keeping us on our toes and continually improving the security posture of our respective organizations.
Read the Full Column
by Joshua Goldfarb




Why Companies Need CISOs and CIOs as Board Members
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Read the Full Column
by Galina Antova



The Evolution of Phishing: Welcome "Vishing"
Vishing is a form of criminal phone fraud, combining one-on-one phone calls with custom phishing sites.
Read the Full Column
by Torsten George







Event

Make Your Vendor Lifecycle More Efficient

If bringing new vendors into your company's network is not as simple as you need it to be, now is the time to change up your TPRM program. Changes in three key areas can result in a more efficient program using the same resources you already have.

Read the eBook




See All Recent Articles at SecurityWeek.Com

Cisco Patches Actively Exploited Flaws in Carrier-Grade Routers: Cisco this week released patches for two high-severity vulnerabilities in IOS XR software that have been actively exploited in attacks for over a month. Read More

Rinki Sethi Named CISO of Twitter: Twitter has appointed Rinki Sethi as its new CISO. Sethi previously held management positions at eBay, Intuit, Palo Alto Networks, Rubrik and IBM. Read More

GitHub Announces General Availability of Code Scanning Feature: GitHub announces the general availability of Code Scanning, a feature that enables developers to easily identify vulnerabilities in their code. Read More

Secure Access Provider Axis Security Raises $32 Million: Enterprise application access provider Axis Security this week announced that it has raised $32 million in Series B funding, which brings the total raised by the company to $49 million. Read More

US Judge Dismisses New Mexico Privacy Claims Against Google: A U.S. district judge has dismissed New Mexico's privacy claims against Google over privacy concerns, but New Mexico's top prosecutor vowed Monday to continue the legal fight to protect child privacy rights. Read More

Russian Sentenced to Prison for Hacking LinkedIn, Dropbox: A Russian national was sentenced to 88 months in prison in the United States for hacking LinkedIn, Dropbox, and Formspring in 2012. Read More

Attacks on Flight Tracking Services Possibly Linked to Armenia-Azerbaijan Conflict: DDoS attacks against flight tracking services Plane Finder and Flightradar24 may be linked to the conflict between Armenia and Azerbaijan. Read More

FireEye Proposes Converged Enterprise and ICS ATT&CK Matrix: FireEye's Mandiant Threat Intelligence and MITRE have collaborated on developing a new visualization able to combine the Enterprise ATT&CK and ICS ATT&CK threat knowledgebases into a single view combining both IT and OT attack behaviors. Read More

VMware Unveils New Cloud Workload Security Solution: VMware announces Carbon Black Cloud Workload, a new security solution designed to help organizations protect workloads running in private, virtualized and hybrid cloud environments. Read More

China-Linked 'BlackTech' Hackers Start Targeting U.S.: The China-linked BlackTech cyber-spies have adopted new malicious tools in recent attacks and they have started targeting the United States. Read More

Ivanti Acquires MobileIron, Pulse Secure: IT asset and service management solutions provider Ivanti on Monday announced the acquisition of MobileIron and Pulse Secure. Read More

FBI, CISA Warn of Disinformation Campaigns Regarding Hacked Voting Systems: Threat actors are expected to spread false information regarding hacked voter information and voting systems, the FBI and CISA said in an alert. Read More

McAfee Files for IPO: McAfee is planning to return to public markets, with an IPO that some estimate at $2 billion. Read More

New FinSpy Spyware Variants Identified, Dissected: Human rights organization Amnesty International has identified new macOS and Linux-targeting variants of the infamous FinFisher-made spyware family FinSpy. Read More

UHS Shuts Down Systems in U.S. Hospitals Following Cyberattack: Universal Health Services (UHS) over the weekend shut down the IT networks at multiple hospitals in the United States, after being hit with a cyberattack. Read More

French Shipping Giant CMA CGM Discloses Security Breach: French shipping giant CMA CGM has disclosed a security breach and according to some reports it involved a piece of ransomware. Read More

New Pastebin Security Features Draw Criticism: Pastebin announces Burn After Read and Password Protected Pastes, but some industry professionals believe they will likely be abused by malicious actors. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2020 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...