threatpost.comFacebook has sued two Chrome devs for scraping user profile data - including names, user IDs and more....

securitymagazine.comWhat is the best path forward? Should companies upgrade their existing platforms or replace them entirely? What makes the most sense both financially and for the security of your data? ...

threatpost.comJudge bars former Tallahassee city ethics officer from internet-connected devices after her arrest for cyberstalking....

Heise Sicherheits NewsDer Entdecker des Bugs warnt vor gefährlichen Angriffsmöglichkeiten. Unsere Einschätzung nach kurzem Test: Es besteht Anlass zur Vorsicht, aber nicht zur Panik....

threatpost.comThe cybercriminal service has scammed victims out of $6.5 million and continues to spread on Telegram....

threatpost.comCISA has issued an alert warning that cloud services at U.S. organizations are being actively and successfully targeted....

securitymagazine.comIn all, taking into account the months that students are in the buildings, the district will have 10 emergency drills, eight of them mandated....

securitymagazine.comSan Diego's Metropolitan Transit System has hired Al Stiehler as Director of Transit Security and Passenger Safety....

Heise Sicherheits NewsVideokameras von smarte Türklingeln von Ring können Videos künftig mit Ende-zu-Ende-Verschlüsselung absichern. Nun startet der erste Test in den USA....

threatpost.comThe optional feature was released free to users in a technical preview this week, adding a new layer of security to service, which has been plagued by privacy concerns....

Heise Sicherheits NewsFür den anonymisierenden Webbrowser steht ein sicherheitsrelevantes Update für Linux, Windows und macOS bereit. Auch für Android liegt eine neue Version vor....

Heise Sicherheits NewsCisco fixt "High"-Lücken in Connected Mobile Experiences und AnyConnect Secure Mobility Client und warnt vor der Angreifbarkeit einiger älterer Router (EoL)....

Heise Sicherheits NewsPentester Tobias Glemser demonstriert die häufigsten Sicherheitslücken in Webanwendungen und erklärt Schutzmaßnahmen. Frühbucherrabatt bis 19.1....

TheHackersNewsCybersecurity researchers took the wraps off an ongoing surveillance campaign directed against Colombian government institutions and private companies in the energy and metallurgical industries. In a report published by ESET on Tuesday, the Slovak internet security company said the attacks — dubbed "Operation Spalax" — began in 2020, with the modus operandi sharing some similarities to an APT...

securitymagazine.comFontbonne University in St. Louis announced a partnership with CyberUp, a national non-profit organization dedicated to closing the cybersecurity talent gap by helping adults and youth pursue cybersecurity careers....

securitymagazine.comHow do you lead a great security team to overall mitigate risks across the entire enterprise? To find out, we talk to Ellen Benaim, Chief Information Security Officer at Templafy. In her role, Benaim is responsible for overseeing company-wide information security and governance program and ensuring the entire organization follows necessary protocols to keep the enterprise secure....

securitymagazine.comRansomware attacks were on the rise long before the pandemic. Over the last two years, ransomware attacks have risen by 200%  – they are becoming more frequent, more expensive, and more sophisticated. This issue is anticipated to continue throughout 2021 and why businesses must be proactive to manage threats and other actionable steps to mitigate any damage....

securitymagazine.comGun safety isn’t a new issue in the U.S., of course — it’s a hot-button political issue, to say the least. Regardless, there is no debate that every organization wants to keep its community safe. So, like almost every other aspect of life that has undergone transformational change over the past decade, the main driver of change in the immediate term will be cutting-edge technology....

securitymagazine.comIn a new alert, the Cybersecurity and Infrastructure Security Agency (CISA) announced that it is aware of several recent successful cyberattacks against various organizations’ cloud services. Threat actors are using phishing and other vectors to exploit poor cyber hygiene practices within a victims’ cloud services configuration. ...

securitymagazine.comWith today’s threat landscape, security and SAM teams need to work together to understand what is installed across network devices and how those are being used for the best asset protection. ...

Weiter