Cyber Security Hub’s recommended blogs to help keep you and your organization secure
Posts tagged "Security"
FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks
The infamous Carbanak operator is looking to juice its ransomware game by recruiting IT staff to its fake Bastion Secure “pen-testing” company.
Threatpost
Flubot Malware Targets Androids With Fake Security Updates
The banking trojan keeps switching up its lies, trying to fool Android users into clicking on a fake Flubot-deleting app or supposedly uploaded photos of recipients.
Threatpost
Ditch the Alert Cannon: Modernizing IDS is a Security Must-Do
Jeff Costlow, CISO at ExtraHop, makes the case for implementing next-gen intrusion-detection systems (NG-IDS) and retiring those noisy 90s compliance platforms.
Threatpost
Fortress Home Security Open to Remote Disarmament
A pair of unpatched security vulnerabilities can allow unauthenticated cyberattackers to turn off window, door and motion-sensor monitoring.
Threatpost
T-Mobile’s Security Is ‘Awful,’ Says Purported Thief
John Binns, claiming to be behind the massive T-Mobile theft of >50m customer records, dissed the security measures of the US’s No. 2 wireless biggest carrier. T-Mobile is “humbled,” it said, announcing new partnerships with security heavyweights on Friday.
Threatpost
Cyber Security Public Private Partnerships
Christopher Cleary, PMP, CISSP, Principal Cyber Advisor, Department of the Navy discusses public private partnerships and more.
The Overlooked Security Risks of The Cloud
Nate Warfield, CTO of Prevaliion, discusses the top security concerns for those embracing virtual machines, public cloud storage and cloud strategies for remote working.
Threatpost
Cyber Security For Data Sovereignty
With the emergence of global data privacy regulations such as GDPR, organizations that collect personal identifiable information (PII) must answer a new question: is data subject to the local laws of…
Zoom Settlement: An $85M Business Case for Security Investment
Zoom’s security lesson over end-to-end encryption shows the costs of playing cybersecurity catchup.
Threatpost