Pages
- 508 Compliance and Accessibility Information
- About
- Acronym DB
- All CS Digest Sections
- CALL FOR PAPERS – 2019 Modeling and Simulation Special Edition of the Journal of Cyber Security & Information Systems
- Community
- CS Digest Poll – Thank You
- CSIAC Journal – Call for Papers for Publication
- CSIAC Journal Article Submission Policy
- CSIAC Terms of Use
- CSIAC to Participate in First-Ever Identity Management Day
- CSIAC Webinar – Applying the Top 20 Critical Controls for Risk Assessment – Chat Log
- CSIAC Webinar – eMASS, the True Story – Chat Log
- CSIAC Webinar – Leveraging Machine Learning – Chat Log
- Cyber COI – Documents
- Cyber COI – Service Point of Contact Information
- Cyber Community of Interest (CoI) Study on Technology Future and Science & Technology Investment: Survey for Industry
- Cybersecurity Awareness Month – October 2020
- Data Privacy Day – Business and Organization Resources
- Data Privacy Day – Consumer Resources
- Data Privacy Day – Fostering a Culture of Privacy Awareness at Work
- Data Privacy Day – January 28
- Data Privacy Day – The Internet of Me
- Director’s Update – January 2021
- Director’s Update – November 2020
- Go Paperless – CSIAC Journal
- Groups
- Home
- Identity Management Day Resources and Tips for Consumers
- Identity Management Day Resources and Tips for Organizations
- Identity Theft Awareness Week
- Inquiry Survey Form
- Members
- National Cyber Security Awareness Month – October 2017
- Cybersecurity in the Workplace is Everyone’s Business – National Cyber Security Awareness Month – Week 2: October 9-13
- Protecting Critical Infrastructure from Cyber Threats – National Cyber Security Awareness Month – Week 5: October 30-31
- Simple Steps to Online Safety – National Cyber Security Awareness Month – Week 1: October 2-6
- The Internet Wants YOU: Consider a Career in Cybersecurity – National Cyber Security Awareness Month – Week 4: October 23-27
- Today’s Predictions for Tomorrow’s Internet – National Cyber Security Awareness Month – Week 3: October 16-20
- National Cyber Security Awareness Month – October 2018
- It’s Everyone’s Job to Ensure Online Safety at Work – National Cyber Security Awareness Month – Week 3: October 15-19
- Make Your Home a Haven for Online Safety – National Cyber Security Awareness Month – Week 1: October 1-5
- Millions of Rewarding Jobs: Educating for a Career in Cybersecurity – National Cyber Security Awareness Month – Week 2: October 8-12
- Safeguarding the Nation’s Critical Infrastructure – National Cyber Security Awareness Month – Week 4: October 22-26
- National Cyber Security Awareness Month (NCSAM) – October 2019
- News
- Privacy and Security Notice
- Resources
- Services
- Set Subscription
- Sitemap
- Site-Wide Activity
- Software Model Repository (SWMR) Has Been Discontinued
- Subject Matter Expert (SME) Application Form and Questionnaire
- Subject Matter Expert (SME) Application Submitted
- Subscription Manager
- Thank you for subscribing!
- The ROI Dashboard and SLED Have Been Discontinued
- We Work For Your Business
Forums
Topics
- ndpoint Protection for Nonprofits: Challenges & Needs
- security intelligencarche & threat rese
- SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence
- Data of 500 million LinkedIn accounts trying to be sold
- Agencies Have Till Midnight April 15 to Apply New Microsoft Exchange Patches
- What the Hybrid Workforce Means for Cybersecurity Teams
- Sorting out the sabotage at Natanz. NAME:WRECK DNS vulnerabilities described.
- The $1 billion Russian cyber company that the US says hacks for Moscow
- Cado Security raises $10M for cloud cybersecurity forensics
- 3 Key Cybersecurity Trends To Know For 2021
- IPOCybersecurity Firm Darktrace Seeks London IPO
- 61 percent of employees fail basic cybersecurity quiz
- Attackers Target ProxyLogon Exploit to Install Cryptojacker
- U.S. announces sanction on Russia and blaming the country for a breach!
- Bolstering Our Nation’s Defenses Against Cybersecurity Attacks
- BRATA Malware Poses as Android Security Scanners on Google Play Store
- FBI hacking hundreds of computers in US for good reason
- Cybercom’s Partnership With NSA Helped Secure U.S. Elections, General Says
- Detecting the “Next” SolarWinds-Style Cyber Attack
- How HHS, GSA Tackled Data Security During COVID-19
- Hackers Using Website’s Contact Forms to Deliver IcedID Malware
- New Malware that is taking users passwords
- 500m LinkedIn accounts leaked
- Over 90% of Organizations Hit by a Mobile Malware Attack in 2020
- Swarmshop breach: 600K+ payment card records leaked
- What Does It Take To Be a Cybersecurity Researcher?
- Russia censorship
- Federal watchdog investigating State Department cybersecurity practices
- Tech support scammers lure victims with fake antivirus billing emails
- Cisco fixes bug allowing remote code execution with root privileges
- Experts fear Biden’s Cybersecurity Exec. Order will Repeat Past Mistakes
- A government watchdog responds to the recent cyber attacks
- Cybersecurity firm StrikeForce acquires Cybersecurity Risk Solutions LLC
- Fake Netflix App on Google Play Spreads Malware Via WhatsApp
- https://www.cshub.com/executive-decisions/articles/5-cyber-security-basics-every
- Malware on Discord!
- 533 Million Facebook Users’ Phone Numbers and Personal Data Leaked Online
- The Secret To A Successful Cyber Security Acquisition: Culture
- A massive Facebook breach underscores limits to current data breach notification
- NSA workflow application Emissary vulnerable to malicious takeover
- Loews Corp Suffers Cyber Attack
- Cybersecurity threats for 2021
- The Personal Data of More Than 533M Facebook Users Has Been Posted Online
- CNA website back online after ‘sophisticated cybersecurity attack’
- Mississippi Launches its First Cyber-Fraud Task Force
- Hacking group with fake job offers targeting LinkedIn users
- facebook and end to end encryption
- Reimagining Endpoint Security
- Ongoing attacks are targeting unsecured mission-critical SAP apps
- SolarWinds hackers accessed DHS acting secretary’s emails
- CISA ANNOUNCES TRANSFER OF THE .GOV TOP-LEVEL DOMAIN FROM U.S. GENERAL SERVICES
- FBI: APTs Actively Exploiting Fortinet VPN Security Holes
- Cybersecurity attack forces University systems shutdown
- Hackers Using a Windows OS Feature to Evade Firewall and Gain Persistence
- Capital One notifies more clients of SSNs exposed in 2019 data breach
- How Biden’s infrastructure package could address electric grid cybersecurity
- According to Microsoft, businesses needs to invest more in firmware protection.
- Fileless malware has been dramatically increase over the past year!
- Cybersecurity attack forces University systems shutdown
- Nationwide cybersecurity attack compromises UC employee data
- Large Florida school district hit by ransomware attack
- A Barrage of Cyberattacks Hits the Financial Sector
- Ubiquiti cyberattack may be far worse than originally disclosed
- Cybersecurity Recommendation System
- https://www.infosecurity-magazine.com/news/uk-cyber-security-council/
- Man charged for hacking Kansas water utility with intent to harm public
- Cybercriminals Targeting Indonesian Banks
- Apex Legends Players got banned for DDoS attack on xbox servers
- PHP’s Git repository got involve in supply chain attack!
- World Backup Day
- Canalys: More data breaches in 2020 than previous 15 years
- Apple patches zero-day targeted for iPhones, iPads and its popular watches
- CNA Hack
- Fake COVID vaccines and certificates being sold on dark web
- Vehicle Cyber Security
- New Android Malware Spotted Posing as System Update
- strange airdrop files
- The Human Center of Digital Digital Development
- What is the good book to learn Finite Automata based Public Key Cryptography
- Google launches Cybersecurity program to train lawmakers
- Microsoft: Black Kingdom ransomware group hacked 1.5K Exchange servers
- Insurance Giant CNA Hit with Novel Ransomware Attack
- HOW CISA IS BUILDING A FUTURE FOR WOMEN IN CYBER
- Your VPN May Be Your Greatest Security Risk During COVID-19
- New Advanced Android Malware Posing as “System Update”
- Over 62,000 Microsoft Exchange Servers, Still Left unpatched
- Watch Out! That Android System Update May Contain A Powerful Spyware
- Facebook Disrupts Spy Effort Aimed at Uyghurs
- Apple patches iPhone, iPad security flaw with updated iOS 14.4.2
- Chinese Hackers Used Facebook to Hack Uighur Muslims Living Abroad
- Ukraine accuses Russian hackers of new cyber attack
- SourceAmerica announces cybersecurity grant for nonprofit agencies
- CNA Financial, a top insurer company, is hit by a cyberattack!
- IonQ Takes Quantum Computing Public With A $2 Billion Deal
- New Cybersecurity Programs to Protect US Energy
- More Urgency Needed to Fix Cybersecurity Issues in Agencies
- Ransomware Attack Foils IoT Giant Sierra Wireless
- https://www.zdnet.com/video/cybersecurity-strategy-going-simple-might-be-the-sma
- The group “Silver fish” behind the SolarWind hack.
- Swiss Cyber Security Firm Accessed Servers of SolarWinds hacking group
- Remote workers admit to playing a significant part
- Hacker using “Zero-day Flaws” to infect mobile device
- Popular Remote Learning Software Found Vulnerable To Hacking
- DHS Announces Steps to Advance President’s Commitment to Elevate Cybersecurity
- K2 Cyber Security Wins Gold for Zero Day Exploits in the 17th Annual Cyber Secur
- Smaller Businesses Rethink Cybersecurity In The Post-Covid-19 World
- According to the FBI, Cyber crime was the second pandemic last year.
- Remote work makes cybersecurity a top worry for CEO’s
- Remote work makes cybersecurity a top worry for CEOs
- Global shortage in computer chips ‘reaches crisis point’
- FBI Alerts There is a Rise in BEC Cyberattacks on US Organizations
- Acer reportedly hit by $50 million ransomware attack
- Hackers infecting Apple apps with certain code projects.
- Dridez Malware Uses Stimulus Checks To Prey on Victims
- Using AI in Cybersecurity
- Chinas big hack
- Cybersecurity Trends to Keep Track of in 2021
- Critical F5 BIG-IP Flaw Now Under Active Attack
- Let’s Talk About NimzaLoader, the New Malware in Town
- An Uprising of DDoS Attacks, a Cause of Concern for Organizations
- Tesla Ransomware Hacker Pleads Guilty; Swiss Hacktivist Charged for Fraud
- https://www.cpomagazine.com/cyber-security/cybersecurity-programs-struggling-to-
- Pandemic Increases the importance of cyber security
- Questions On Cyber-security for Employees and IT Teams in SMEs
- UK publishes cyber defense by 2025 goals.
- Free Advanced Cybersecurity tech from Microsoft
- Third party password holder Verkada gets hacked
- The Hybrid Work From Home Experience
- Data Protection Laws!
- Jails, Tesla Among Exposed By Hackers In Breach of 150,000 Cameras
- Vantagepoint A.I. Releases New Cybersecurity Sector For Traders
- Cybersecurity allies: Why you need them and how to find them
- COVID-19 and Fundamental Changes in Cyberattacks
- Cybersecurity requirements provide new opportunity for CPAs
- cybersecurity stocks scan: jim cramer
- UK Cyber Security Council Unveils Inaugural Leadership Team
- Secureframe lands $18M to help companies comply with cybersecurity standards
- DuckDuckGo claims Google is “spying’\” on users and stealing private info!
- 18-year-old gets 3 years in prison for “Bitcoin scam” hack
- CISA releases new SolarWinds malicious activity detection tool
- If 2020 was a game…it was just the “demo”.
- Cisco Plugs Security Hole in Small Business Routers
- Cisco Plugs Security Hole in Small Business Routers
- Free hack_it event aims to help cybersecurity pros hone their skills
- Startup Cybersecurity company raises 21 million for new platform
- For US cyber defense, helpful hackers are only half the battle
- Chinese hackers target Western Australia’s parliamentary during election!
- China suspected of cyber attack on Western Australia’s Parliament
- Apple May Start Delivering Security Patches Separately From Other OS Updates
- Florida man sentenced to 3 years in prison for hacking Twitter
- Duckduckgo browser extension leaves cyber attacks open
- Cyber threat to public transport
- Pentagon’s Logistics Agency Uses Software Bots to Improve Accuracy/Efficiency
- Hackers are targeting Covid-19 vaccinations.
- Cyber security and technical challenges faced by financial sector.
- Following the Solarwinds hack, and the MS Exchange ProxyLogon flaw…
- Linux Systems Under Attack By New RedXOR Malware
- Exploiting the latest MS Exchange servers Vulnerability
- Opportunity to reskill federal workforce for AI jobs ‘underutilized,’
- 36% of Americans have been impacted by Cybersecurity attacks
- Adoption of Cybersecurity Framework
- Ransomware now attacks Microsoft Exchange servers with ProxyLogon exploits
- What is the best UTM firewall vendor?
- Thirty dollars will get you review materials to four cybersecurity certificates
- Ransomware on Spanish labor agency
- Ransom-seeking hackers are taking advantage of Microsoft flaw
- Google Looks to Protect the Web
- The next pandemic may be in cyberspace
- Jail gets hacked with cameras
- Cybersecurity Trends and Emerging Threats in 2021
- Scammers has started to target investor to earn more money then typical BEC scam
- ProxyLogon PoC Exploit Released; Likely to Fuel More Disruptive Cyber Attacks
- Hacker sells Cybersecurity Exploit disguised as NFT
- iPhone Call Recorder Taps into Conversations!
- Linux Systems Under Attack By New RedXOR Malware
- Microsoft Issues Security Patches for 89 Flaws — IE 0-Day Under Active Attacks
- Millions in Covid relief funding to be used for federal cybersecurity efforts
- 2020 was a ‘record-breaking’ year in US school hacks, security failures
- Camera maker Verkada is hacked gaining access to Tesla’s cameras
- Are American Companies taking cyber security seriously?
- Google Cloud Unveils New BeyondCorp Zero Trust Security Platform
- Phishing Campaign Targets Executives With Fake Voicemail Notifications
- (ISC)² establishes Global DEI Task Force to expand cybersecurity workforce
- Fake ad block gives cryptominer to peoples computers
- Millions in Covid relief funding to be used for federal cybersecurity efforts
- Microsoft’s big email hack: What happened, who did it, and why it matters
- Verizon details C-Band purchase, talks 2021 5G improvements at investor event
- Researchers Unveil New Linux Malware Linked to Chinese Hackers
- Microsoft Issues Security Patches for 89 Flaws — IE 0-Day Under Active Attacks
- Florida school shuts down online over security risk
- News Direct Cutting-Edge, Cloud-Based Technology Helps Protect Clients
- Number of ransomware grows more than 150%!
- Government watchdog report highlights federal cybersecurity risks
- 9 Android Apps On Google Play Caught Distributing AlienBot Banker and MRAT Malwa
- Microsoft Attack Blamed on China Morphs Into Global Crisis
- NORTH KOREA’S CRYPTOCURRENCY THEFT SCHEME – APPLEJEUS
- Cybersecurity Trends and Emerging Threats in 2021
- Massive Supply-Chain Cyberattack Breaches Several Airlines
- A new and non-intrusive method for preventing cyber attacks on Android devices
- China server hack
- Biden makes cybersecurity ‘top priority’ in national security guidance
- Insight on the Cybersecurity Global Market to 2026
- https://www.helpnetsecurity.com/2021/03/03/strategies-small-security-teams/
- Dark web takedowns on for the rise for 2021
- Hacker selling stolen data from adecco user
- New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!
- OrthoVirginia impacted by cybersecurity attack
- CompuCom MSP hit by DarkSide ransomware cyberattack
- Scammers have FAKE federal IDs!
- Biden makes cybersecurity ‘top priority’ in national security guidance
- Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow
- Federal Agencies Patch Exchange Servers
- U.S. issues warning after Microsoft says China hacked its mail server program
- Public Sector Organization for Delivering Secure Apps
- The Cyber Diplomacy Act of 2021
- Directed Energy Combined Test Force oversees testing of anti-drone weapon
- Cyber CEO: Next war will hit regular Americans online
- Free Ransomware Protection for U.S. Private Hospitals
- Cyber CEO: Next war will hit regular Americans online
- Linux vulnerability, Npower app hack, and Total Fitness ransomware attack!
- Supply chain espionage attack targeted by Russia
- Cybersecurity risks connected to AI in autonomous vehicles
- First-Ever AI Technology Platform to Automate Security Questionnaires
- A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account
- Polecat held for Ransom
- Scientists have build a new random number generator using a single laser!
- Chinese Hacking Groups Silently Invading Indian Organizations
- Tether cryptocurrency firm says docs in $24 mil. ransom are forged
- Cyber Mercenaries in Demand
- ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process
- https://www.bleepingcomputer.com/news/security/nsa-microsoft-promote-a-zero-trus
- Biden’s plan to boost U.S. chip production finds an ally in banned Chinese firm
- SolarWinds cybersecurity spending tops $3 million in Q4, sees $20 million to $25
- The Woman Bulldozing Video Games’ Toughest DRM
- Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs
- Cisco Releases Security Patches for Critical Flaws Affecting its Products
- Chinese spyware code was copied from America’s NSA: researchers
- The top cybersecurity challenges of 2021
- North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
- US Senators Discuss New Cyber Policies In Hearing
- A woman dies after hackers cause IT failure
- New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa Card
- New Malware Found on Almost 30k Apple M1 Macs
- French President Pledges €1 Billion to Cyber-Security Amidst Hospital Ransoms
- Nvidia’s anti mining chip does not stop attackers.
- How hackers are a dilemma to entrepreneurs in 2021
- Attempted hack on Pfizer for vaccine information by North Korea
- 5 biggest cybersecurity threats
- Aston Martin forms a partnership with cybersecurity platform SentinelOne
- CISA AND CYBER.ORG PARTNER TO DELIVER CYBER SAFETY VIDEO SERIES
- Guess what? Your Amazon Data is at Risk!
- 78% of top security leaders say their organizations are unprepared for a cyberat
- Phishing attackers target Microsoft users impersonating as delivery corporations
- Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations
- Twitter’s New Hacking Label Already Hacked
- Hacker attempted to poison Florida city’s water supply
- Apple takes action against Silver Sparrow malware…
- Lazarus Group Using AppleJeus Malware for Cryptocurrency Theft – Cyware Social
- DHS announces new measures to boost nation’s cybersecurity – The Hill
- Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its Users
- 2021 the Year of Adaptive Cybersecurity
- Spotify to launch HiFi high-quality-audio subscription later this year
- Netflix can download movies and shows it thinks you’ll want to binge next
- Is our government taking proper precautions to protect us?
- Biden Hires Cyber Security Team
- From ‘Forbes 30 under 30’ to jail
- The White Houses Response to the Solar Winds Hack
- Ringleaders of internet scams caught
- 14 million alleged Amazon and eBay account details sold online
- Microsoft releases emergency fix for Windows 10 WiFi crashes
- Space Force starts transitioning cybersecurity professionals into its ranks
- Top Biden cybersecurity official details response to SolarWinds breach
- Cybersecurity Statistics and Trends for 2021
- Hackers attacking Myanmar government for justice
- A android app that threatens spying and malware.
- Cybersecurity experts warn Lyka users’ data, privacy may be at risk
- Do you use Discord?
- Defense lists cyber mitigation as key factor for building ethical AI
- Office 365 will help admins find impersonation attack targets
- Chatham County personal information found for sale on the Internet.
- Microsoft releases emergency fix for Windows 10 WiFi crashes
- Microsoft releases emergency fix for Windows 10 WiFi crashes
- Cyber attacks hit two French Hospitals
- Back to back French hospital ransom attack
- Hackers use Google’s Apps script to steal CC info.
- SDK Bug Lets Attackers Spy on User’s Video
- Non-profit pledges $1 million to offer free ransomware protection for private ho
- Healthcare Facilities Under Cyberattack
- CYE raises $120 million for security that uses hackers and AI
- FireEye Breach
- Celebrity SIM-Swap Attack
- U.S. Accuses North Korean Hackers of Stealing Millions
- malware targeting Apple
- Kia Motors America suffers $20 million ransom
- Masslogger swipes Outlook, Google Chrome Credentials
- SolarWinds Breach
- Barcode Scanner app on Google Play infects 10 million users with one update!
- I need your opinions about securing a LAN.
- Court Sends Invictus Obi To Ten Years
- Cybersecurity risks connected to AI in autonomous vehicles
- Forget fingerprints — AI may soon use your veins to identify you
- Mimecast breach
- Cybercriminals abusing Discord
- Artificial Intelligence Is a Work in Progress, Official Says
- Cyber safety video series
- IT Leaders Outsourcing Cybersecurity to Help with Increased Attacks
- QNAP patches critical vulnerability in Surveillance Station NAS app
- “Malvertisers” Exploited Webkit 0-Day to Redirect Browser Users to Scam Sites
- How to avoid Phising
- Spotify Suffers Second Credential-Stuffing Cyberattack in 3 Months
- Myanmar’s proposed cybersecurity bill draws wide condemnation
- Is hiring a compliance consultant a choice, or a need?
- Russian Spies Hacked the Justice,State,Treasury,Energy and Commerce Departments
- Yandex employee caught selling access to email accounts.
- New agent Tesla variants can bypass security walls
- 5 ways to a strong password and better personal cybersecurity
- CD Projekt Red Source Code Hacked
- Biden administration brings expertise, new attitude to cybersecurity
- Solar Wind Hack is inspiring the U.S. to improve their Cyber teams
- Lawmakers Contemplate Improving Cybersecurity Importance in New Administration
- Google extension Gain Traction as Attack Vector
- US Cyber Weapons were leaked – and are now being used against us!!
- Apple Maps to include accident, speed trap reporting in iOS 14.5 update
- Researches found 223 vulnerabilities used in recent ransomware attacks
- Five cyber threats to watch in 2021
- Malware uses discord to target gamers
- Popular phone app hacked!
- Slack App on Android has been found storing passwords in plain-text!
- “Respecting Consumer Privacy”
- Investor Data Breach
- Cybercriminals Celebrate V-Day
- Various Malware Lurks in Discord App to Target Gamers
- Positive development in Sweden as Cyber Security Center is established.
- Unfortunate situation in Florida as someone attacks water treatment facility.
- Florida Water Treatment Facility Hack
- Syracuse University students names and SS info leaked after data breach!
- New phishing techniques uses Morse code to hide malicious URLs
- Supply-Chain Hack Breaches 35 Companies
- Avon, offline after cyber attack.
- Popular Video game hit with ransom-ware
- Hackers Abusing Google Chrome Extension to Exfiltrate Data
- New Cyber Threat with Android Devices’ ABD
- A risk-based approach to national cybersecurity
- 2016 Malware Campaign Resurfaces in India, Brazil, and Indonesia
- Hackers try contaminating Florida town’s water supply through computer breach
- Iowan leaks drug trafficking info by security breach
- More exploitable flaws found in SolarWinds software
- Experian Data Breach Claims
- International police take down malware network
- Security experts predict 21 key trends for ’21
- Instagram Drops the Hammer on Fake OGs
- Due to COVID-19 cyber attacks are increasing and so is a demand for cyber pros
- Cyber World War (Information World War)
- Which Part of Incoming “IPV4 Packet” is compared with “virus Signature”
- Data Privacy – Regulations for Business
- Data Privacy – Online Learning and Child Privacy
- Data Privacy – Personal Data Hygiene
- Data Privacy – Own Your Privacy
- Why is disaster recovery important?
- Sunburst Malware are being use to Target Government around the world !
- The Binary Security story: A cybersecurity startup run out of Darwin
- Best universities for MSc degree in Cyber Security in Europe
- Hacker targeted military component unit!
- K-12 Attacks
- Tech unicorn UiPath discloses data breach
- Hacker are taking advantage of WinZip and causing trouble
- How can schools protect their systems during COVID-19
- FireEye
- Interested to know the AI tools for continuous monitoring
- Educational System is Not Ready For The Next Age Of Learning
- What metrics or measurements qualifies a cybersecurity program as effective?
- Cybersecurity trends and threats that we will see against FI’s?
- Cyber Security financial sector resources
- The future of privacy law and its impact on global business behaviour
- TikTok sale deadline elapses as negotiations with US continue
- Huntsville City Schools Experience Ransom
- Kmart Have Been Infiltrated
- Zoom Impersonation Attacks Aim to Steal Credentials
- iPhone Bug Allowed for Complete Device Takeover Over the Air
- Facebook Messenger Bug
- IT-ISAC and ISACA Form Strategic Partnership to Collaborate on Cyber Initiative
- researchers discover method of exploiting robotic vacuums to gather audio data
- Justice department lawsuit against google
- The worst passwords of 2020 show we are just as lazy about security as ever!
- Waves of attacks on US hospitals show a change in tactics for cybercriminals
- 7 Cyber Security Predictions for the Upcoming Year
- "6 Cybersecurity Tips For Remote Workers"
- COVID-19 app leaked peoples healthcare info
- Five Emerging Cyber-Threats to Watch Out For in 2021
- Platypus Attack Abuses RAPL Mechanism to Steal Data from Intel CPUs
- Hackers steal over 83 million dollars worth of content
- Hackers attempt to target covid 19 vaccine
- Microsoft says three APTs have targeted seven COVID-19 vaccine makers
- Platypus Attack Abuses RAPL Mechanism to Steal Data from Intel CPUs
- CISA Director Expects to be Fired
- Pros digging into the dark web to try and be like the bad guys
- The Effects of a Pandemic on Cyber Threats
- Windows Zero Day Attack
- Play Store identified as main distribution vector for most Android malware
- Google and Mozilla fixed issues exploited at 2020 Tianfu Cup hacking contest
- DHS Senior Cyber Security Official is Stepping Down
- Animal Jam Was Hacked
- "Gotham Joker": Malware
- Australian government warns of possible ransomware attacks on health sector
- Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms
- Nintendo victim to credential stuffing attack
- Lifelab breach in Canada
- Alabama's second cyber attack
- Microsoft Pushes 112 Patches
- Ransomware attacks grow more menacing during the pandemic, creating headaches in
- No Hacks on Election Day, But Pros are Still Prepared
- Google Calls Out Windows on Vulnerability That Remains Unpatched
- What does Big Tech know about you? Basically ALL your personal data
- FBI Warns Against Using Hotel Wi-Fi for Work
- Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition
- COVID-19 App Sharing Private Info
- New Google Drive Scam Being Sent Out
- Ghimob Malware Targets Android Apps
- Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered
- Divisive political climate stirs up hacktivist activity
- FTC orders Zoom to implement stricter security standards
- The pandemic brings new risk, even as nature of cyber threats remain pretty fami
- Fake Microsoft Teams updates lead to Cobalt Strike deployment
- Army launches ‘Hack the Army 3.0’ with more targets for cybersecurity researcher
- North Korea Hackers Use Spyware in Job Offers
- CyberSecurityWebTest
- Gitpaste-12 Worm Targets Linux Servers, IoT Devices
- Update Your iOS Devices Now 3 Actively Exploited 0-Days Discovered
- New Malware Gitpaste-12 Worm
- Google patches two zero days in Chrome
- Ransomware attack toys with Mattel systems, data
- Cyberattacks: Just How Sophisticated Have They Come?
- Apple Patches Three Major Bugs
- Cyber Security as Competitive Advantage
- North Korean Hackers Use Spyware
- Cyber Threats Revolving Around Coronavirus Outbreak
- New "Zoom Snooping" Can Deduce What You Type Based on Shoulder Movements
- Officials staying Preparing After the Recently Calm Voting Process
- Facebook and TikTok block hashtags used to spread election conspiracy theories
- Office 365 Phishing Scam
- "more states now have paper trails to verify votes were counted"
- Air Force deploys commercial IT capability
- Russian hacker group targeted state Democratic parties in repeat of 2016 attacks
- Emails Try To Scam People
- Cybersecurity threats to corporate America are present now ‘more than ever,’ SEC
- Office 365 Phishing Images
- VMware Fixes Remote Code Execution Vulnerability
- Google Drive’s Collaboration Feature is Being Exploited by Hackers
- mTLS 1.2 vs 1.3
- Microsoft Games Can Be Used For Privilege's On Windows
- Hacker in Iranian are being sponsored to steal voter data in the US
- Cyber Attack Maps to See Digital Threats
- New Chrome Zero-Day Under Active Attacks – Update Your Browser
- 23,600 Hacked Databases leak from unused data breach index site.
- Fake COVID-19 Test Result Email Drops King Engine Ransomware
- Iranian Hackers using Spoofed Emails to Steal Election Data
- New Haven, CT filed over $200k for former employee’s data theft
- Why Cyber Security Is Still So Complex
- Suspected Chinese Hackers Unleash Malware That Can Survive OS Reinstalls
- $100 Million Botnet Scheme Gets Cybercriminal 8 Years of Jail
- Wroba Mobile Banking Trojan Spreads to the U.S. via Texts
- WordPress Patches 3-Year-Old High-Severity RCE Bug
- Inside an Attempted Election Hack: A US Cybersecurity Operative Tells All
- Browser Bugs Exploited to Install 2 New Backdoors on Targeted Computers
- Ransomware alert. Cybersecurity's "water treatment model." Managing and transfer
- Trump Campaign Website Is Defaced by Hackers
- Retirees wins back money scammed on PayPal-UPS scam site
- Can automated penetration testing replace humans?
- FBI Warns U.S Hospitals of Imminent Ransomware
- Cyberattacks Cause Massive Network Outage at UVM
- Data Security- What is it? Why does it matter? Why should I care?
- The police can probably break into your phone…
- Scammers are spoofing bank numbers to rob people
- "Election operations are holding up so far against a wave of hacks…"
- Hackers steal 2.3 million from Wisconsin Republican Party
- Tennessee National Guard Aids in Nashville during Election
- COVID-19 vaccine cyber security data attack
- Trump says nobody gets hacked, gets hacked twice in one week
- Federal Agencies warn hackers targeting U.S. hospitals with ransomware attacks
- Coronavirus-Related Cyberattacks Still A Major Threat
- McAfee Brands Are Being Abused
- COVID-19 Impact on Bug Bounty
- Facebook “copyright violation” tries to get past 2FA – don’t fall for it!
- Government taking caution against Election Day Hacks
- Medical Records of 3.5 Million U.S. Patients Can be Accessed and Manipulated by
- Russian Hackers Stealing U.S. Government Data
- Zoom End-to-End Encryption
- Hundreds of Irrigation Systems Left Exposed With Default Settings In Israel.
- The 5 biggest cybersecurity threats for the healthcare industry
- Cybersecurity company finds hacker selling info on 186 million U.S. voters
- FBI: Hackers stole government source code via SonarQube instances
- Working From Home Increases Cyber Security Threats
- US blames Iran for spoofed Proud Boys emails
- Hackers hold patient info for ransom in psychotherapy data breach
- Atos acquires sec consult
- British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers’ Data
- Pharma Company Leaks Customer Information
- Trump's Campaign Website Hacked
- FBI: Hackers stole government source code via SonarQube instances
- Russian State-Sponsored Attacks
- Russian Intelligence Officers Wanted By The FBI
- Nvidia warns people of severe driver flaws
- 'Among Us' Mobile Game Security Concerns
- 12 Cyber Threats That Would Wreak Havoc on the Election
- Machine-learning technique from Sandia Labs could improve fusion energy outputs
- Hackers Hit Yorktown and Croton School Districts
- DoD/CJCS/NIST guidance on SOP for Handling data received from outside orgs
- Microsoft aggressively targets Botnet servers
- Cybersecurity And The Remote Classroom
- Nvidia issues fixes for exploits in geforce experience app
- French IT Firm Affected by Ransomware Attack
- Cybersecurity Awareness Month 2020: Overcoming new threats
- Trustwave find hacker selling 186 million US voters Information
- I Hacked Trump’s Twitter by Guessing Password
- 50 million artificial neurons to facilitate machine-learning research at Sandia
- New Chrome 0-day Under Active Attacks – Update Your Browser Now
- New Popular Game Receives Controversy over "Spyware"
- New Windows T-RAT, Controllable from anywhere using a Telegram Channel.
- Oracle releases large bug fix.
- U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks
- NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers
- Egregor Claims Responsibility for Barnes and Noble Attack
- Cybersecurity firm finds hacker selling info on millions of U.S. voters
- Covid-19 Scams Not Dead Yet
- United Kingdom Accuses Russia of Hacking the 2020 Olympics
- Fake McAfee Software
- Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison
- Sina Weibo
- Quora Breach
- UK Investigates DNS hijacking
- Capitol One Data Breach
- Google’s Waze Can Allow Hackers to Identify and Track Users
- How to ensure your SaaS solutions are secure
- US indicts Sandworm, Russia's most destructive cyberwar unit
- Russian cyber-attack spree shows what unrestrained internet warfare looks like
- $1M Cyber Resiliency Fund launched to support security ops impacted by pandemic
- Discord desktop app vulnerability chain triggered remote code execution attacks
- The ransomware ‘industry’ is becoming more commercial and professional than ever
- Critical Magento Holes Open Online Shops to Code Execution
- Ghanaians Need to be Privacy Conscious
- Carnival Corp. Ransomware Attack Affects Three Cruise Lines
- Barnes & Noble under goes a cybersecurity attack
- Intcomex Data Breach
- Twitter breach leads to cybersecurity rules for social media giants
- Fitbit Spyware Steals Personal Data via Watch Face
- Hackers target US Census Bureau network
- Microsoft seeks to disrupt Russian criminal botnet
- Cyber hacktivism or Cyber espionage? NATO documents found
- Credit card security compliance declines for third consecutive year
- Miami-based tech company suffers massive 1TB customer and business data leak
- Chinese APT Group Targets Media, Finance, and Electronics Sectors
- Bluetooth Flaw in Linux Systems
- Phishers Capitalize on Headlines with Breakneck Speed
- "8 Cybersecurity career options in high demand"
- As attackers evolve their tactics, continuous cybersecurity education is a must
- TikTok Launches Bug Bounty Program as Part of Expanding Threat Disclosure
- Barnes & Noble confirms cyberattack, suspected customer data breach
- "NitroHack" Steals Your Discord Info
- FIFA 21 game scams: watch out for unsporting conduct
- Robinhood Internal Probe Finds Hackers Hit Almost 2,000 Accounts
- Twitter has experienced a major outage, with users across the world affected.
- Universities Targeted
- Microsoft Patch Tuesday fixes 87 flaws, 11 critical
- Microsoft and Other Tech Companies Take Down TrickBot Botnet
- The Important Difference Between Cybersecurity And Cyber Resilience
- FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
- FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
- TikTok expands disclosure efforts on cybersecurity threats
- Trickbot is Forced Offline in Major Cyber Security Victory
- TikTok expands disclosure efforts on cybersecurity threats
- CISA and FBI are aware of an Iran-based cyber actor targeting U.S networks
- Police Raid German Spyware Company
- Government Agencies and Networks Face Constant Barrage of Attacks
- Google warns of a severe bluetooth flaw 'Bleedingtooth' in Linux Kernel.
- US Joins Six Countries for Encryption Access
- Hackers Target the Election
- Soldier Center’s new fabric will enhance cybersecurity
- Microsoft and Other Tech Companies Take Down TrickBot Botnet
- Fitbit Spyware Steals Personal Data via Watch Face
- Facebooks Bug Bounty Program
- Fitbit Stealing Private Information
- How CISOs Can Address Cyber Security Challenges From COVID-19
- learn how to protect yourself from hackers
- Teasing Secrets of Trump COVID Diagnosis Helps Phishing Scam
- Companies opting out of DHS threat-sharing platform call for better data
- An inside look at how ransomware groups go stealth
- Facebook Page Hack
- Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks
- Hacking group discovers major security flaws in apple
- Industrial Cyberattacks Get Rarer but More Complex
- Apple Bug Bounty Program Leads to Discovery of Critical iCloud Exploit
- Why the Recent Spike in Android apps Violating Google's ad Policy
- Microsoft announces new initiatives to promote cybersecurity awareness
- Cyber-avengers protecting hospitals from ransomware
- Fullz House Hacker Group Hacked Mobile Provider to Steal Credit Card Data
- Phishing attack spoofs IRS COVID-19 relief to steal personal data
- Tesla accuses employee of Californian factory sabotage
- More Than 1000 Air Force Cyber Security Workers Transfer to Space Force
- Android ransomeware is becoming more advanced
- Google are stepping up their security to protect gmail user from hacker
- New Wireless Arlo Cameras
- New Security Alerts For Gmail Users
- Microsoft Azure Vulnerability's
- "3 ways criminals use artificial intelligence in cybersecurity attacks"
- Amazon Prime Day Spikes Phishing
- Tyler Technology's
- 3 ways criminals use artificial intelligence in cybersecurity attacks
- 55 Apple Vulnerabilities discovered by group
- Israeli Startup Changing the Landscape of Cyber Security for the Better
- A Cybersecurity Checklist For The New Norm
- Cyber Security Awareness Month
- COVID-19 Clinical Trials Slowed After Ransomware Attack
- Watch Out! Hackers are After Legacy Software
- Phishing attack spoofs IRS COVID-19 relief to steal personal data
- 'Mercenary' hacker group runs rampant in Middle East, cybersecurity research sho
- Increase in phishing attachments, infected with Emotet Botnet trojan.
- Food Delivery Service Chowbus Exposes 800,000 Customer Records
- New 'MosaicRegressor' UEFI Bootkit Malware Found Active in the Wild
- DoD takes steps to safeguard supply chain
- You might think computer mouse are harmless, but is not.. here's why!
- Hackers attack Nevada school district, publish social security numbers online
- Banks Urged To Prepare For Surge In Cyberattacks
- Amazons palm reading starts in grocery stores
- Disappearing Covid-19 app alerts cause alarm
- Video-Game Piracy Group ‘Team Xecuter’ Leaders in Custody
- ePlus launches CyberSmart Initiative for Cyber Security Awareness Month
- Facebook Malware that took over accounts and placed scammy ads a growing risk
- Private Information Exposed After Ransomware Attack.
- Phishing pages leverage CAPTCHAs to fool users, evade detection
- Cyber-security firm McAfee files for IPO
- MGM Data Dump
- Trick and No Treat in the Google Play Store – 10/05/2020
- VISA reports new strains of point-of-sale (POS) malware
- Why does your business need cyber-security consultancy services?
- Twitter Hack
- Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison
- Years-Long ‘SilentFade’ Attack Drained Facebook Victims of $4M
- Joker Trojan
- Hacker from Russia Sentenced for Stealing Information from LinkedIn
- Cybersecurity researcher hacks smart coffee maker with ransomware, uses it to as
- County election computer networks still vulnerable to cyberattacks
- Twitter removed around 130 Iranian accounts for interference in US Presidential
- Madison City allows $200,000 budget for Cyber Security
- The Evolution of Cybersecurity Threats During COVID-19 and What You Can Do About
- Industrial Cyberattacks Get Rarer but More Complex
- H&M Fined 41 million in Data Protection Scandle
- Twitter Hires a New Cyber Security Chief after a Devastating Breach
- Google removed this week 17 Android apps from its Play Store because they were i
- Russian Sentenced to Prison for Hacking LinkedIn, Dropbox
- Facebook Small Business Grants Spark Identity-Theft Scam
- NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk
- MVHS intrusion (Still developing)
- Cyber-security Hacks Smart Coffee Maker
- 61% of business don't apply basic password securities
- Foreign Hackers Cripple Texas County’s Email System, Raising Election Security C
- "Cybersecurity Awareness Month: Train employees to be first line of defense"
- IPStorm Botnet Affects Windows,Android,Mac,Linux Machines.
- BlackTech: A Hacking Group with a Busy Agenda
- Paper to pen for emergency workers
- Large Attack On Medical Chain
- Cyber attack hits major hospitals
- Ransomware attack on one of US’s largest healthcare systems
- A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems
- Nebraska Med. Cyber Attack Update
- A patient died after a Ransomware attack hit a hospital
- SMS scam are still a thing and is still dangerous. Here’s why!
- Iranian Hackers Run Rampant
- Instagram bug made users vulnerable to hackers, cybersecurity firm claims
- Nebraska Medicine Postpones Appointments due to Security Issues
- TikTok says suicide video was part of ‘coordinated attack’
- Hackers in Iran attempting to cause chaos.
- "Just 44% of Healthcare Providers Meet NIST Cybersecurity Standards"
- U.S. Secret Service looks to private sector to boost financial cybercrime probes
- Twitter prepares for US election with new security training, pen testing
- New Variants of Cross-platform FinSpy Now Target Mac and Linux Users
- Foreign Hackers Cripple Texas County’s Email System, Raising Election Security C
- Here’s why most Americans are not able to vote online in 2020
- Amazon's New Palm Reading Tech
- Vaclav Havel Airport in Prague Opens New Cybersecurity Center
- After breach, Twitter hires a new cybersecurity chief
- Fortinet VPN leaves businesses exposed
- Angelo State gets NSA grant for cyber security program
- Microsoft servers still open for exploited flaw
- Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
- Source Code of Windows XP Leaked
- North American Users Lost Microsoft 360 Access
- Chinese hackers hacking usa government systems
- Annual Tennessee National Guard Cyber Security Event
- Canva Breach
- Social Media Data Leaks
- Only 10% of IT professionals have the cyber security skills needed in EU
- Instagram flaw shows importance of managing third-party apps, images
- ARE-ON partners with CRITICALSTART for cybersecurity protection
- CISA & EAC Develop Risk Profile Tool for Election Officials
- Ring’s Flying In-Home Camera Drone Escalates Privacy Worries
- "‘We are outnumbered’ — cybersecurity pros face a huge staffing issue"
- A New Hacking Group Hitting Russian Companies With Ransomware
- Major Instagram App Bug Could've Given Hackers Remote Access to Your Phone
- Practical Steps to Better Prepare for Potential Attacks
- Major Bug in Instagram Could've Gave Hackers Remote Access to Your Phone
- Group Member From The Dark Overlord Gets Sentenced to Five Years in Prison
- Gaming Industry has been attack in the worst way possible. Here is why!
- After Six Long Years, a New "Kitten" is Finally Out of the Hat
- Gamer Credentials Now a Booming, Juicy Target for Hackers
- GCA Releases Updated Cybersecurity Toolkit for Small Businesses
- Alien Android Banking Trojan Sidesteps 2FA
- India’s COVID-19 surveillance tool exposed millions of user data
- Hackers Earn Millions From Popular Video Game through In Game "Skins"
- Google rolls out new automated threat detection tool
- Hackers attack Russian Businesses with TinyCryptor Ransomware.
- Unsecured Microsoft Bing Server Exposed Users' Search Queries and Location
- Firefox for Android Vulnerability
- Cybrary Survey Finds Skill Gap Threatens Job Effectiveness
- Three Cyber Security Actions Companies Should Take for Long-Term Remote Work
- ActiVision Accounts Hacked- 500,000 Call Of Duty Players Could Be Affected
- FBI hopes a more aggressive cyber strategy will disrupt foreign hackers
- Hackers Continue to Interfere with Online Schooling
- The first death resulting from a cyberttack on healthcare infrastructure
- Patient Dies in German Hospital Because of Ransomware Attack
- German Woman Dies due to Cyber Attack
- Iran and China Exploit Similar Flaws at the Same Time.
- Hacker aim for politicians account on twitter
- Oracle will inherit TikTok security, privacy headaches
- The TikTok Ban: Security Experts Weigh in on the App’s Risks
- Five Chinese Hackers Charged by The U.S.
- Iran-Based Threat Actor Exploits VPN Vulnerabilities
- DOD Works to Increase Cybersecurity for U.S., Allies
- CISA,FBI working with industry to make it ‘more painful’ for hackers to function
- Man Pleads Guilty to Role in $600K Malware Protection Scam
- What the Zerologon vulnerability means for the state of enterprise security
- Zoom Security Upgrade
- iranian hackers indicted.
- BlueKai breach
- Covid-19 is accelerating digital transformation of Cyber-security
- IBM, AI And The Battle For Cybersecurity
- Newcastle University cyber attack
- "Hackers for China have successfully compromised US government systems…"
- FBI Releases Cybersecurity Advisory on Undisclosed Iranian Malware
- Security Training Email Phishing Campaign
- Dunkin' Donuts Cyber Security Hole Result in $650,000 Fines
- "Hackers Continue Cyberattacks Against, Catholic Orgs"
- Dunkin' Donuts' hole in cybersecurity costs $650,000 in fines
- Former Australian PM Information Leaked.
- Microsoft Vulnerability Exposed
- WhatsApp study on security how unsafe it really is.
- A New macOS Malware Variant is going unnoticed by antivirus scanners
- Trump administration rolls out policy to secure outer space technologies against
- Staples Data Breach
- Server Misconfiguration Leaks Personal Info from Razer
- Two people caught for defacing US websites after Iranian general died.
- Accidental Airbnb account takeover linked to recycled phone numbers
- Development Bank of Seychelles (DBS) Hit by Ransomware
- TikToc Fixes Flaw that Opened Android App to Compromise
- Fairfax County Public Schools Computers Attacked
- Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits
- Attacks on Linux Servers are Rising Like a Rocket
- 46,000 veterans impacted by VA data breach
- Chinese intelligence hackers target U.S. government network
- Security researchers slam Voatz brief to the Supreme Court on anti-hacking law
- With election cybersecurity experts in short supply, some states call in the Nat
- Russia, China and Iran launched cyberattacks on presidential campaigns, Microsof
- APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins
- Cybersecurity Companies Expose Sensitive Data Online
- New Bluetooth Flaw Can Help Hackers Easily Target Nearby Devices
- TLS Encryption With Timed Attacks
- Gaming Community A Target For Cyber Criminals
- A New Type of Linux Malware Steals Call Details
- Gaming Community A Target For Cybercriminals
- A Company hijacked 28,000 unsecured printers to raise awareness
- Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns
- Cyber security poses threat to East Tennessee virtual schools
- Cyber attack On Thailand Hospitals
- "Creating a Cybersecurity Culture starts with your team"
- Hospitals in Thailand Targeted by Ransomware Attacks
- Cost of Cybercrime Study
- Fake Login Pages Mess With Big Name Brand Tech Companies.
- Spyware Labeled ‘TikTok Pro’ Exploits Fears of U.S. Ban
- most enterprises have had cybersecurity breaches.
- cybersecurity costs should be taken into consideration during m&a deals
- United Airlines Leaks Data
- Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange
- Raccoon attacks break TLS encryption Under Certain Conditions
- Raccoon attack can break TLS encryption Under Certain Conditions
- Hackers Target School Districts
- Finding Out The Data Breach Costs Before it Happens
- A new app that tracks COVID-19 is raising privacy questions
- MAZE Ransomware Group Attacks US School System
- Facial Recognition Ban In Portland
- Personal information possibly exposed in NorthShore data breach
- Japan cybersecurity minister admits he has never used a computer
- United Airlines’ website bug exposed traveler ticket data, 09.10.2020
- Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles
- Zoom Passwords up for Sale on the Dark Web
- National Guard Providing Help in the Upcoming Election
- Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
- Cybersecurity Role in Helping Retail Post Covid-19
- Most Cybersecurity Companies Have Leaked Private Data
- Data center giant Equinix discloses ransomware incident
- Cyber Security Issues in Video games
- Army robo-teammate can detect, share 3-D changes in real-time
- Components Putting Operational Hardware and Software Technologies at Risk
- Cybersecurity for US Space Systems
- Why you shouldn’t throw away your broken IP camera
- Tiktok national security Threat
- Visa Warns of Payment Card Theft by Baka Card Skimmer
- 16 Year Old Launches Cyber Attack Against School.
- A data fail left banks and councils exposed by a quick Google search
- How SMBs are overcoming key challenges in cybersecurity
- Hackers Target Twitter Employees
- "Most cyber-security reports only focus on the cool threats"
- China Launches Initiative for Global Data Security Issues
- City of Hartford postpones first day of school after ransomware attack
- Why Academic Openness and A Rise in Online Classes Should Invoke a …
- Federal Agencies Ordered to Make it Easier for Hackers to File Bug Reports
- Another University become a victim of cyber attack
- Apple approves malware disguised as Adobe Flash
- Slack users unwittingly phished with malicious payloads
- 86% of businesses say they're not ready for the next stage of the Data Age
- Hackers Might Be Chasing Trump's Campaign And Business Websites
- Trump Administration Focuses on Cybersecurity in Space
- Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware
- US Cybersecurity Agency Requires Disclosure
- NSA Surveillance Program Illegal
- Unsecured RDP Endpoints Attract Ransomware Gangs
- 5 Cybersecurity Threats to Be Aware of in 2020
- Python PyVil RAT Spreads to Fintech Companies
- Miami-Dade Schools Hit by CyberAttack interrupting virtual classroom learning.
- Free program blocks 10 million malicious domains from state and local government
- Cybersecurity in Governments
- Third Party and Supply Chain Risk Management
- Manufacturing Industry Cyber Security Landscape
- Cybersecurity in the Banking industry
- Top Management Sponsorship
- Bailey & Galyen Attorneys at Law was hacked by Ragnarlocker.
- Video About The Cyber Crime Awareness
- Need advice
- What is PCI PIN?
- How Do You Protect Your Master Passwords ?!
- Where to find motherboards verified no hardware or UEFI security issues
- [Security Rating] Discussion for supplier with IP in bad reputation
- A few questions from an infosec student
- How does php code gets executed in LFI
- Self Assessment
- Machine Hardening
- Application Layer DDoS attacks
- DoD Recommendation for Private Citizen Online Browsing
- World Economic Forum's 5 principles for effective cybersecurity leadership
- Cybersecurity Incident Response
- New Technologies bring innovative challenge for Cybersecurity: Robots?
- Data transfer between systems
- Control frameworks in the field
- Solution To Password Problems : GATE [ Graphic Access Tabular Entry ]
- The Cloud for Financial Institutions
- How GitHub untangled itself from the ‘Octopus’ malware that infected 26 software
- Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking
- Organizations Face Shortage of Cybersecurity Skills
- Cyber Security firms raising millions as hacking numbers spike
- IBM ups their layered cybersecurity strat to boost data resiliency and security
- How to limit insider threats within an organization
- Shoppers Using Malicious Browser Extensions
- Global Cyber Security Market is forecasted to grow at a slower rate
- 53% of People Admit They Reuse the Same Password for Multiple Accounts
- Balancing Public Health And Data Privacy: Where Does COVID-19 Meet Cybersecurity
- Cyber attacks worry hospitals
- Remember to change your password
- Coronavirus Cybercrime Increasing during Pandemic
- DHS working to sucre mobile emails
- Small Business Administration mistakenly leaks data
- Covid-19 unites cyber security experts
- Webkinz World Hacked
- Small businesses using free or even no CyberSecurity Tools
- Shoppers Using Malicious Browser Extensions
- Is my company protected?
- RMF Controls with CCI's Polices
- RE: Sony Pictures Hack in 2014
- Usability to increase security
- SSH Credentials Targeted in Data Breach of Hosting Giant GoDaddy
- Hacking of Giannis Antetokounmpo's accounts being investigated
- Hackers Steal Data from Microsoft's Github
- 46% of businesses report having a remote working security scare
- China-based hacker group is hacking Asia-Pacific governments
- 'Blacklist', 'whitelist' terms banned by UK cyber security agency due to racism
- CS Digest Article Suggestion 3
- North Korean Hackers Attack Apple Computers
- Toll Group Suffers Ransomware Attack Again
- Are you Ready for These 26 Different Types of DDoS Attacks?
- 2FA app weaponized to infect Mac users with Dacls RAT
- 2FA app weaponized to infect Mac users with Dacls RAT
- Presidential Campaign Possibly Hacked
- Covid 19 – First 100 Days in The Cyber World
- Cyber-spies hunt Covid-19 research, US and UK warn
- FGCU virtual graduation derailed by cyber attack
- Late Notice: Tomorrow's Security Variety Show Reg Link
- AI the new cybersecurity?
- Apple Iphone at risk of being hacked through the email app
- apple camera phones hacked
- Game bans players who hacked to be better
- The FBI is sending more public alerts then normal
- Thief's threaten to leak data acquired in the Torrance, CA Ransomware attack
- Foxit and Phantom PDF are prime targets for remote code execution
- Ruby Developer Libraries infected with malware that targets Bitcoin Wallets
- Content Delivery Networks and clouds join MANRS internet security effort
- Cybersecurity for Remote Workers: Is Your Team Secure?
- Battling Cybercrime by Adding Cloud Internet Security to SD-WAN
- Cyber attacks increased during the pandemic
- Clearview AI was cyber hacked
- Cybersecurity Project
- Zoom Now Implementing Call Routing
- Vulnerability Scanning
- OWASP Top 10 Vulnerabilities And Preventions 2020
- New Way of Attacking the 2020 Campaign
- A Good Time to Invest in Cyber Security
- Large email extortion campaign underway
- Solution To Password Problems : GATE [ Graphic Access Tabular Entry ]
- Hackers have hit every country on Earth with coronavirus-themed cyberattacks
- Facebook tried to buy NSO Group's Pegasus spyware to monitor iOS users
- US to ban China Telecom
- Sandboxie Windows sandbox is now open-source!
- Only 25% of enterprises focus on cyber-attack prevention
- 'Unkillable' Android malware gives hackers full remote access to your phone
- Cyber security Breaches at Oakland and Berkeley
- Cybercriminals Hide Malware Under SSL
- “MakeFrame” Skimmer Targets E-commerce Businesses in New Campaign
- Thousands of Android Apps Are Silently Accessing Your Data More than 4,000 Googl
- 44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig
- Zoom has been hacked
- Iranian hackers are exploited corona virus epidemic.
- fake email from WHO
- DODIG-2020-067: Followup Audit on Corrective Actions Taken by DoD Components …
- Unwanted Guests In Zoom Conference Calls
- The Coronavirus Cure Scams Continue
- Cyber security Experts combat hospital ransomware
- Malware Vollgar makes a come back attacking Microsoft SQL servers
- Zoom Removes Data-Mining LinkedIn Feature
- Beware! Hackers Deliver USB Devices Containing Malware Using Best Buy Gift Cards
- Two 0-day flaws found in Zoom
- Marriott Security Breach Impacts Over 5 Million Guests
- Bitcoins Stolen From QR Code Generator
- Patch Released for Linux Kernel Vulnerability Disclosed at Hacking Contest
- Flaw in Rank Math WordPress Plugin Allows Hackers to Revoke Admin Privileges of
- Cloudflare Launches a DNS-Based Parental Control Service
- Hacking Attempts up by 37%
- People are getting hacked just days after downloading the houseparty app.
- FBI warns against zoom hackers.
- GoDaddy Employee Victim of Phishing
- cyber-criminals targeting zoom and google during these trying times
- People are concerned about the increase in mass surveillance
- Houseparty app offers people $1,000,000 for Information about Hacking
- The WHO Hack Warns Of 'Massive' Remote Work Risk
- Zeus Sphinx Banking Trojan Returns From the Dead in New COVID-19 Baiting Phishin
- Zoom Scrutinized As Security Woes Mount
- Nefilim Ransomware Threatens to Release Data
- Zoom Removes Feature Sending Data to Facebook
- Two New COVID-19 Related Phishing Scams
- Marriott Data Breach
- Zoom Hacked
- Zoom Exploite
- CS Digest Article Suggestion 10
- CS Digest Article Suggestion 9
- CS Digest Article Suggestion 8
- CS Digest Article Suggestion 7
- CS Digest Article Suggestion 6
- CS Digest Article Suggestion 5
- Hackers Pretending to be (WHO) As Coronavirus Spike & Attempt To Steal Passwords
- Beware! Hackers Deliver USB Devices Containing Malware Using Best Buy Gift Cards
- Computer scientists' tool fools hackers into sharing keys for better security
- Coronavirus criminals: Authorities wage war against virus scammers, thieves, imp
- Stolen Data on Sale
- Analyzing the Behavior of Vidar Information-Stealing Malware
- Analyzing the Behavior of Vidar Information-Stealing Malware Vidar is capable of
- World Health Organization Targeted in Phishing Attack
- Android Apps Spying on Your Software
- Zero-day Remote Code Execution Vulnerability on Windows 7
- Virgini Media Owes Up to £4.5bn Due To Breach
- Malware Named "TwoSail Junk" Targets iOS Users
- Maze ransomware group claims Chubb as victim
- hackers use fake corona antivirus to get malware on people computers
- Hackers are hijacking routers to push malware-laden Covid-19 apps
- Zoom Meetings Targeted
- U.S health agency attacked
- Mobile Ad Fraud Used To Make Money
- 400 Experts Are Fighting COVID-19 Scams
- US Cyber Experts See Spike In Chinese Espionage
- Virtual "Cyber School" set to launch amid school closures
- Hackers Learning To Bypass 2FA
- Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
- New “WildPressure” APT Group Targets Industries in the Middle East
- Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
- Corona Virus used as cover
- AMD'S New GPU's have been stolen
- LabCorp Data Breach
- Zyxel NAS devises targeted by Mirai variant
- New IOS surveillance campaign underway
- Skimmers code found on Tupperware's website
- 5G inherits Diameter Signaling Protocol Vulnerabilities from 4G
- Coronavirus Cyber Attacks
- Phishing attacks more common than ever
- iOS Bug Prevents VPNs From Encrypting All Traffic
- Vulnerability In Windows 10
- McAfee wins its seventh industry award
- Attack on Home Routers send users to Spoof Sites
- Hackers Pretending to be World Health Organization (WHO) As Coronavirus Spike
- FormBook Malware Campaigns Attacking Aerospace and Manufacturing sectors
- New AI-Driven Security Software for Wi-Fi Launched
- Coronavirus Effects on Cyber May Not Be Felt for Weeks
- Service Provider for GE Faces Data Breach
- Covid19: Attacks on Heathcare systems
- Which type of assets is more important in terms of cybersecurity?
- Why cybersecurity matters more than ever during the coronavirus pandemic
- T-Mobile: third party email attack
- What companies should do to inform their employees about cyber risks
- What are key considerations while integrating wearables with HealthCare App
- Cybersecurity at home
- Cybersecurity Money to Combat Exploited Pandemic
- Twitter changing safety guidelines regarding COVID-19 posts
- Windows Defender Skipping Items During Scan
- Cybersecurity talent pool
- Extortion Emails Threaten to Infect Your Family With Coronavirus
- German army’s sensitive data found on laptop bought from eBay
- UK Fintech Firm Finastra Hit By Ransomware, Shuts Down Servers
- Account takeover and data scraping attacks on e-retailers up as COVID-19 surges
- loT To Expand Service Portfolios
- PC Matic Offers Free Cybersecurity Protection
- Hackers Promise 'No More Healthcare Cyber Attacks' During COVID-19 Crisis
- Microsoft Explains How It's Fighting Coronavirus-Related Cyber Attacks
- COVID-19 & Infrastructures Resilience
- The Most Threatened Sectors
- Phishing an attack method that has maintained longevity
- UK cyber security lacking
- Data Breach at a British Printing Press
- Critical RCE Bug in Windows 7 and Server 2008 Gets Micropatch
- Newly Found Nefilim Ransomware Borrows Code From Nemty 2.5 Ransomware
- Corona Virus Pandemic offers opportunity for Threat Actors to Steal Info
- Schools are teaching more in cyber-security
- Small Businesses are at risk to hackers
- France warns of new ransomware gang targeting local governments
- Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusio
- Scams, Fraud and How Cybercriminals are Taking Advantage of Coronavirus
- France Allowing Some Huawei Gear In Fifth Generation Network
- Threat Data Vs. Threat Intelligence
- There is a 2020 ethical hacking course bundle for only $60.
- 67 percent high number of security breaches reported than five years back.
- Whisper App Kept Users Profile Information Unsecured
- Malware Delivery Through Fake Website Certificate Errors
- Malicious domains are using presidential candidates’ names
- New smartphone vulnerability found through Siri
- Arkansas Children's Hospital Reboots System After Cyberattack
- The CyberSecurity Industry is Consolidating
- US Health and Human Services Department target of Cyber Attack
- Us gov't unable to reach quickly enough to cyber threats
- Canadian Government Breaches
- Fifth Third Bank data breached
- Microsoft 365 Working on APT Feature to Block Emails That Fail Authentication
- Youtube phishing
- Oklahoma accused of negligence in data breach
- Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
- Hacker's benefit from Kobe Bryant
- China increasing mass surveillance
- Microsoft Issues March 2020 Updates to Patch 115 Security Flaws
- Hackers are phising with Corona-Virus and HIV themed emails
- Telecommuting Tools Made Free Amid Coronavirus Outbreak
- Microsoft Warns Of 'Devastating' Cybersecurity Threat To Windows Users: Here's W
- Forensic : extract files from MFT table Volatility [1]
- Zero-day vulnerability in SaaS services exploited to launch IDN Homograph-like a
- Chinese Espionage Allegations
- Flaw in Intel Chipsets
- J.Crew Data Leak
- T-Moblie Data Breach
- 900,000 customer's data breached from Virgin Media
- Free WiFi Service Exposed User Details
- Windows Explorer Used by Ransomware to Evade Detection
- PwndLocker Ransomware Gets Pwned
- T-Mobile Data Breach Exposes Customers Personal and Financial Data
- White hat hackers find thousands of vulnerabilities
- TQL hit with Cyber phishing attack
- Can someone help me to answer this question, is very important, thank you
- Ethical Hackers Find More Bugs Than Ever In Pentagon
- Baby Monitors can be Hacked to Spy on You
- US Grants $8 Million to Ukraine for Cybersecurity Assistance
- 126 Million in Fines and Counting
- Walgreens new app problems
- Hackers attacking privileged accounts leaves businesses at risk
- We need to start teaching young children about cybersecurity
- 5G and IoT security
- Russian Agents Reportedly Tapping on Undersea Internet cables that Take Entire
- New Mexico Filed Lawsuit Against Google for Spying & Collecting Personal Data
- Google issues Chrome update patching possible zero day
- Better Mobile Security with a Mobile Threat Defense Plan
- Cyber security experts: Hackers target children’s SS numbers
- Documents were leaked for three major companies
- Chrome 80 cripples cybercrime marketplace
- Tesla's hacked by 2in black tape?
- Facial Recognition Company Loses Entire Database to Hackers
- Surfing Attacks' Could Let Hackers Read Your Texts
- Ransomware victims thought their backups were safe. They were wrong
- Modern malware is increasingly leveraging evasive behaviors
- New Orleans Shuts down City Servers
- Ransomware and Data Breaches triple in 2019
- CISA Agenda For 2020
- Jolly Cooperation Required
- Israeli Marketing Firm Stored 49 Million Email Addresses in PlainText on Server
- Hackers Attempt To Access Clean SS Numbers
- Newly Discovered IMP4GT Attack Identified Targeting 4G Mobile Networks
- Attacks targeting judges are on the rise.
- Apple's iOS Pasteboard Data Leak
- The iBaby monitors are now vulnerable to hackers.
- Wifi vulnerability
- Clearview AI breach
- Defence Information Systems Agency (DISA)
- Leader Of AtomWaffen Arrested For Hoax Calls
- New Tools That Tricked Hackers
- New cybersecurity allaince to tackle fragmentation
- Multinational Attack Campaign By Iranian APT Group Targets Government Organizati
- Silence Hacking Group Threatens Australian Banks of DoS Attacks if Ransom Not Pa
- New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices
- Clearview AI Client List Stolen.
- DISA breach likely exposed personal data on at least 200K
- Ransomware Becoming Bigger Problem Than Ever Before
- State Department Officials Blame Russia for Cyber-attacks
- Challenges that cause CISOs to fail
- Hacking is the New Cold War
- Lucy Security Receives Three Gold 2020 Cybersecurity Excellence Awards
- Tesla Pays German Bug Hunter $10k Bounty!
- Top 10 Android Pentesting tools
- Phishing Attack on Advocate Aurora Health
- Phishing attack catches Human Resource Department – Exposes Employees
- What is unified security management (USM)
- Making Use of Cyber Threat Intelligence
- New Jersey Hospital Faces Lawsuit Over Ransomware Attack
- Over 8.4 Million DDoS Attacks Reaching Up to 622 Gbps Detected in 2019
- Cyber Hackers target and demand money
- Microsoft Makes Antivirus for Linux
- US Sponsors Pull Out of Cybersecurity Event
- EU's Cybersecurity Legislation
- Secure Information of the White House has been Breached.
- Hackers us Coronavirus outbreak scare to spread malware
- Google sued by NM Attourney for collecting student data
- New GDPR legislation speeds up detection of cyber attacks.
- Ransomware attacking Croatia petrol station chain
- Cybercrooks Laid Bare 10.6 Million Hotel Guests' Data On Hacker Forum
- Over 8.4 Million DDoS Attacks in Total and 16 Attacks Detected Every Minute in 2
- New Emotet Smishing Campaign
- Email extortion scam targeting websites that use Google's AdSense
- Social Media Company Will Pay For Your Recordings
- Over 1.2 Million Passengers Details Exposed in the SpiceJet Data Breach
- Cybercrooks Laid Bare 10.6 Million Hotel Guests' Data On Hacker Forum
- Microsoft is bringing its antivirus software to iOS and Android
- New Cybersecurity Standards Pose Challenges for Industry
- How to set up a secure digital forensics lab
- Incident Management Process and Policy Importance – Free Template
- Web Security from bodHOST continues with VTMScan
- NYC Mayor accidentally tweets virus link
- Ukrainian malware spreading through darkweb
- Justice Department charges 4 members of Chinese military for massive Equifax hac
- Data Breaches are a major concern
- New Way to Use Stolen Credit Cards
- Dell sells its RSA cybersecurity unit for $2.075 billion
- AZORult Malware Infects Victims via Fake ProtonVPN Installer
- MIT researchers identify security vulnerabilities in voting app
- Senator Calls For Dedicated US Data Protection Agency
- IRS Urges Tax Prep Pros & Individuals To Enable MFA in Tax Prep Software
- Huawei stealing US corporate secrets.
- Projected Cybersecurity Trends for 2020
- 97 out of the top 100 airports fail cyber-security testing
- Iranian hackers planting backdoors in companies by hacking VPN servers
- BEC Scammers Siphoned Off $2.6 Million From Puerto Rico Government
- Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
- FBI warns over fresh malware from North Korea
- Coronavirus malware scams return with a venegeance
- U.S. Government Confirms ‘Malicious’ New Malware Threat: Beware—This Is The Wann
- Scammers Steal $2.6 Million From Puerto Rico Government
- Keyless Entry
- Cisco Prepares Acquisition Bid For Cybersecurity Firm FireEye: Report
- CS Digest Article Suggestion 4
- Cybersecurity Jobs Going Begging As College Computer Science Grads Lack Skills
- Mapping the Known Unknowns of Cybersecurity Education
- PayPal Phishing Scam
- Toll Group Shuts Down Systems
- Chinese military charged with Equifax Hacking
- $43M cyber security to spot attacks beforehand
- Cybersecurity Is A Government Game
- Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
- BEC Scams Accounted For $1.7 Billion, Half Of Total Cybercrime Losses In 2019
- FBI: Cybercrime tore a $3.5b hole in victims pockets last year
- Microsoft Breach
- Executive Given New Charges From US
- Operational Technology Attacks Increased By Over 2000% In 2019
- Cyber Attack Takes Down 25% Of Iranian Internet
- New legislation to create a Data Protection Agency
- Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs
- Google: Efforts Against Bad Android Apps on Play Store Are Working
- Russian Hackers linked to Racine, Oshkosh ransomware attacks
- Cyberattack downs Pensacola computers hours after Navy base attack
- Emotet Malware Infect New Victims through wi-fi connections
- Ransomware Actors Targets Police Department in Miami, Demand Millions in Ransom
- Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
- New Topic
- Leaked report describes Federal Parliament's cyber security as having 'low level
- Build a SOC or Choose an MSSP?
- Build a SOC or Choose an MSSP?
- Hackers taking advantage of coronavirus scare to spread malware
- Zero-day vulnerabilities
- Personal information on 36,000 inmates was leaked
- Chinese Military Hackers charged in Equifax breach
- You might be able to get up to $100 from the settlement for Yahoo’s data breach!
- Build a SOC or Choose an MSSP?
- Metamorfo banking malware spreads around the world
- Independent Airport Cybersecurity Test Reveals Concerning Results
- From secure code to defense in depth
- From secure code to defense in depth
- Lock My PC Used By Tech Support Scammers, Free Recovery Available
- Facebook's Official Twitter and Instagram Accounts Hacked
- Websites to be blocked at a workplace to prevent any malicious activity
- India's Data Protection Bill Threatens Global Cybersecurity
- The Vulnerable Voting App
- united nations got hacked
- Awareness Myth Busting
- US Interior Defense grounds Mavic drones at risk of cyber security attacks
- IT Practices in the Iowa Election
- County's Servers and Computer Systems Face Cyber Attack
- Charming Kitten Uses Fake Interview Requests to Target Public Figures
- Emotet trojan
- NSA exposed bug in Microsoft software
- Iowa caucus debacle is one of the most stunning tech failures ever
- Cybersecurity Firm Named ForeScout Sold For $1.9 Billion
- Financial sector attacked by backdoor called Minebridge.
- How to not get hacked: Jeff Bezos
- FBI ‘Drive-By’ Hacking Warning Just Got Real: Here’s How This Malicious New Thre
- WhatsApp Vulnerability CVE-2019-18426
- Smart Light Bulbs Can Still Be Hacked
- NIST tests methods of recovering data from smashed smartphones
- Chrome 80 Released With 56 Security Fixes
- IRS Releases “Identity Theft Central” to Help Educate and Protect Taxpayers
- Wisconsin city Ransomware
- Quantum Boost Boss Busted by Dominos Pizza
- Researcher Discloses Critical Flaws Affecting Millions of HiSilicon Chips
- Anubis Phishing Trojan Targets Banking on Android Phones
- Phishing Attack Exposes Personal Information of 5,000 at Community College
- IT to Red Team: How to Make the Jump
- FBI warns of possible DDos attack on vote registration websites
- BlackBerry converts to software cyber security leader
- UK police warn about hackers becoming cleaners to get inside of companies.
- 97% of airports today do not pass cyber-security regulations
- Hackers stole over a million dollars from charity
- Automox raises $30 million to protect enterprise endpoints from compromise
- Twitter Fixed Issue That Allowed Matching Phone Numbers to Accounts
- A case for using Blockchains in Cyber Threat Intelligence
- Google Accidentally Shared Private Videos of Some Users With Others
- Iowa caucus debacle shakes public confidence 2020 security
- Maze ransomware publicly shaming victims into paying
- TA505 Phishing Campaign Sending Malware in Excel Files
- Emotet Gang Attempts to Infect Japanese Targets with the Scare of Coronavirus
- CEOs are deleting their social media accounts to protect against hackers
- Google now treats iPhones as physical security keys
- "Soon, mandatory cyber security course for all JNTU students"
- Space executive says the industry needs help to understand cyber threats
- Microsoft offers bounty up to $20,000 for XBOX security flaws
- Microsoft Detects New Evil Corp Malware Attacks After Short Break
- Cyber forensics and incident response study plan
- Cyber experts discuss national security
- UN Offices in Geneva and Vienna Suffered Major Hacking Attack Last Year
- DOD cyber standards for contractors coming this week
- Uk's cyber security sector worth £8.3 million
- NFL, UFC, and ESPN accounts were hacked.
- New topic
- Cool New topic
- CS Digest Article Suggestion 2
- CS Digest Article Suggestion 1
- Researchers report cyber risk associated with micromobiles
- Attack on water company causes loss in money and network outage
- UK Enacts Stricter IoT Safety Laws
- Huawei set to be allowed limited role in UK 5G network.
- Anti-Virus Subsidiary Collected Data From Millions
- WAWA Breach
- Government Spyware Company Spied on Hundreds of Innocent People
- Ninth Annual Cost of Cybercrime Study
- U.N. Hack Stemmed From Microsoft SharePoint Flaw
- Dept. of Interior grounds its drones amid cybersecurity concerns
- Unprecedented cybersecurity measures being taken to safeguard Iowa caucus result
- Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers
- Space ISAC to Release Cybersecurity Portal
- How Vulnerable is your car to cyberattacks?
- Sprint Exposes "Social Care" Forum User Data
- New Topic
- New Research Exposes Cybersecurity Risks for E-Scooters and Riders
- NFL Twitter Accounts Hacked
- NSA Releases Guidelines to Improve Cloud Security
- Is it bad for Mail User Agent IP addresses to be visible in email headers?
- Hackers in Turkey
- Exploring the Nature and Capabilities of Anubis Android Banking Trojan
- Wawa Breached Credit Card Information Now Being Sold
- Historian believes that brain hacking might be coming soon
- Fake Amazon Representatives stealing money
- The World Wants More Tech Regulation
- Saudi Prince Who Was Mad at Jeff Bezos May Be Involved In 2018 Phone Hack
- Ryuk Stealer malware updated to target military and government files
- Inside the World’s Highest-Stakes Industrial Hacking Contest
- Another Poor Cybersecurity Audit at State Department Draws Scrutiny
- Another Poor Cybersecurity Audit at State Department Draws Scrutiny
- A brief introduction to malware analysis
- How to discover your network using Nmap
- F5-GTM Global traffic Manager Course now at Udemy
- Cyber Threat Intelligence (CTI)
- Myth-Busting: Threat Intelligence
- Resource: OSINT tools and how to use them
- Hello
- Password Breaches Becoming More Common in 2019
- Data leakage during transfer is a noted flaw in the 5G standard
- WireGuard vpn to be added into new Linux kernel
- VPNs becoming more prominent, efficient and viable
- Google records device locations
- China is Going All in on Quantum Security
- Health and IT being targeted
- CS Digest Article Suggestion 10
- CS Digest Article Suggestion 9
- CS Digest Article Suggestion 8
- CS Digest Article Suggestion 7
- CS Digest Article Suggestion 6
- CS Digest Article Suggestion 5
- CS Digest Article Suggestion 4
- What is the best way to do assess Third party supplier ?
- Password stealing Campaign
- Airbus Launches Human-Centric Cybersecurity Accelerator
- Google Trending Cybersecurity news headlines for this week
- Bill to enhance regulators’ cybersecurity passes HFSC
- Avast Target of Cyber-Security Attack
- TrickBot gang now a malware supplier for North Korea
- Vulnerabilities in Blink Home Cameras
- iOS bug in air-drop allows lock outs
- Intel CPU "digital vaults" not so secure
- External Risk Assesment
- New ransomware threat on Windows 10
- How far should we drill down when Assessing Third party Suppliers ?
- Cybersecurity predictions for 2020
- Implementation of Employee Training Programs Should = Lower Insurance Premiums
- U.S. Government alerts financial services of ongoing Dridex malware attacks
- Rolling Code/Pins
- CMMC Appraoch/Framework
- Cybersecurity: Getting to the source
- Security Risks
- Network and data visibility
- The FBI Warns that Smart TVs Could Be Spying On You
- The Biggest Cyber Security Attacks of 2019 – UPdates
- Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts
- IBM social engineer easily hacked two journalists’ information
- You can do something about robocalls
- Chinese Hackers Now Stealing Text Messages, Phone Records From Telecom Companies
- Ransomware Attack Downs Hosting Service SmarterASP.NET
- Two Security Researchers Earned $60,000 for Hacking an Amazon Echo
- How to detect a phishing site?
- Cybercriminals are doing big business in the gaming chat app Discord
- Alleged mastermind behind $20m stolen-card site extradited to US
- Monero website has been hacked, their wallet application found to have malware.
- How the most damaging ransomware evades IT security
- Potentially Unstoppable Ransomware Evasion Technique: “RIPlace
- RDP Risks
- Hacking Autonomous Vehicles
- Steam Scam
- Major Breaches
- Hacking vulnerability
- Microsoft fixes Authenitification
- Attacks Over the holiday
- New StrandHogg Vulnerabilty for Android Devices
- US Gov't Changes Approach to Ethical Hackers
- Ransomware hits French hospital: 6000 computers end up on lockdown
- GitHub Security Lab to Find the Vulnerabilities with Open Source Applications
- CyberCriminals Sold Tools in Dark Web to Hack Disney+ Accounts Before it Was Lau
- Europol captures actors behind IM-RAT, cuts off malware operations
- Target Sues Insurer Over Data Breach
- Diverse Cyberattack Tactics Require Advanced Network Defenses
- Unsecured Server Exposes 4 Billion Records
- Scammers Steal Log-In Credentials Through Microsoft Excel Scam
- Microsoft Windows Update Scam
- Brand new Android smartphones shipped with 146 security flaws
- Iranian Hackers Use Special Botnets
- US Jails NeverQuest Malware Creator
- Person steals cofidential hospital information
- Man gets arested for 3 different cybercrimes
- T mobile attacked again
- Waterloo Brewing loses 2.1 million
- How does dns cache poisoning really work?
- Cybersecurity Experts Warn of Black Friday Email Scams
- New Phoenix Keylogger
- Mozilla Expands Bug Bounty Program
- New NextCry ransomware goes undetected by antivirus engines to target Nextcloud
- Why Has Multifactor Authentication Has Become a Target For Hackers?
- Instagram stalker app Ghosty yanked from Play store
- "Hundreds of Millions" of People Affected by Android Security Breach
- North Carolina has a meeting to increase cyber security in the state
- State of Louisiana responds to attack on state servers
- Scammed in Nigeria
- Fake "Windows Update" Installs Cyborg Ransomware
- Cyber Criminals Have Registered Over 100,000 look-alike Domains
- Are Bluetooth Devices Vulnerable to Hackers?
- New Keylogger is on the loose.
- New vulnerabilities found in android OS
- App "Whatsapp" vulnerable to attackers.
- New NextCry ransomware goes undetected by antivirus engines to target Nextcloud
- Google Buys Fitbit For $2.1 Billion,because they don't have enough of your data
- Google Is Collecting the Personal Health Data Of Millions of People
- How long does it take a midsize company to onboard VMWare Airwatch/WorkspaceOne
- Beware, online shoppers! Cybercriminals have registered over 100,000 look-alike
- US, Montenegro plot cyber warfare ahead of 2020 election
- Louisiana spurns attempted ransomware attack, governor says
- It's Time For Everyone To Stop Using Passwords
- Encryption: An Endangered Species
- Are Your Encrypted Emails Really Encrypted?
- East Texas School District Suffers Ransomware Attack
- Cybersecurity is Heasing into a Recruitment Problem
- Need Help For Unusual Case
- Phishing Scam
- scammers create over 100k fake domains to target retailers
- women gets scammed out of 300k for simply wifi problems
- Stealthy Malware Files Under AV Radar with Advanced Obfuscation
- Penetration Testers In Iowa Arrested by Clueless Sheriff For Doing Their Job
- CPU becomes vulnerable and risk of hacking
- college had become a big target for hackers
- Voice activated devices can be hacked by a laser
- Stolen Credit Cards Validated Ahead of Black Friday
- Hacking group in Iran built their own VPN network
- Ransomware in Canada
- Chip Flaw Let Hackers Steal Private Data Off Android Devices
- Colleges are appealing targets for hackers
- Javascript skimmer "Pipka" found to be targeting e-commerce websites
- Many Public Cloud Infrastructures Suffer from Serious Security Loophole, Reseach
- vpn set up to hack
- Texan schools hit with ransomeware
- ransomeware on oil company in Mexico
- Threat Actor Impersonates USPS to Deliver Backdoor Malware
- China having more cyber attacks than ever before
- 7.9 Billion Records Exposed So FAR in 2019
- General election 2019: Labour Party hit by second cyber-attack
- Cybrary Lands $15 Million Series B Round to Train Cybersecurity Workforce
- 5G Networks Still Vulnerable to Location Tracking, Downgrading Attacks
- Exposed Wi-Fi Passwords To Hackers
- Strange Ransomeware Only Targets Specfic Drives
- Hashing
- Facebook bug accesses iPhone’s camera while user scrolls through News Feed
- Universities and Colleges Under Attack
- Why Perpetrators of Phishing Attacks Love Social Engineering?
- Google’s cybersecurity project ‘Chronicle’ is in trouble
- Google’s cybersecurity project ‘Chronicle’ is in trouble
- Exposed Wi-Fi Passwords To Hackers
- $6.3 Million Grant Puts NAU At The Forefront Of Cyber Security
- SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
- Cybercrime Tool Prices Bump Up in Dark Web Markets
- Cyber Crime On The Rise In Oregon
- Antivirus hid more than 9,000 'cybercrime' reports from UK cops, says watchdog
- YouTube Videos Pushing Bitcoin Tool Infects User With Trojan
- Amazon’s Ring Video Doorbell Pro
- Cyber security Project- Good Security Controls and Prices for Sheriff's Office
- DoJ Says Ex-Twitter Employees Acted as Agents for Saudi Arabia, Violated Twitter
- Hypothetical Global Banking Ransomware Attack – What Might Dooms Day Look Like?
- Hackers Are Coming For Medical Devices
- 5 Most common places your data is hacked in 2019
- A former White House employee makes cyber security more accessible
- Siri on MacOs reads encrypted emails in plain text with the Apple Mail app.
- Lawsuit: Electronics giant Philips accuses Seattle-area company of hacking its m
- Everis Hacked: Ransomware Sample Emerges, Company Silent on Attack
- NordVPN Suffered a Security Breach, Denies Being Hacked
- Facebook sues Israeli cybersecurity company NSO and claims it helped hack WhatsA
- Former Disney Employee Claims the Company Hacked into His Personal Computer
- Surveillance cameras being used in Pittsburgh made by Chinese company banned by
- Canada Hit with Ransomware
- DDoS Brains that Authorities Put to Sleep in 2019
- Email Scams from fake Cable Company in Canada
- Amazon Echo Hacked In Hacking Contest
- Newly discovered ‘Light Commands’ vulnerability can be used to hack Alexa and Si
- Common Evasive Phishing tactics – Cybercriminals
- The Declining Effect of Disclosures on Threat Groups
- Newly discovered ‘Light Commands’ vulnerability can be used to hack Alexa and Si
- VPN’s are being used a digital defense by FBI in oregon
- Intel chipsets have more security vulnerabilities
- Russia going offline to perform tests
- The American Cancer Society website hacked?
- FL City Loses over $500,000 due to Phishing Attack
- Adobe Creative Cloud leaks info of 7.5 million users online
- Crypto exchanges remain one of the most targeted platforms in 2019.
- Hackers Are Coming For Medical Devices, How Can You Defend
- Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals
- Hospital loses patient records after ransomware attack
- URMC to pay $3 million penalty
- 4 Billion lost to crypto hackers
- An Illinois Superhero
- Video doorbell help attacker get the Wifi!
- Cyber Attack in school district!
- serius vulnerability found in smart doorbell
- Fingerprint Scanners are not secure
- QNAP Warns Users to Secure Devices Against QSnatch Malware
- Specially Crafted ZIP Files Used to Bypass Secure Email Gateways
- Amazon's Ring Video Doorbell Pro Vulnerability
- Chronicling Facebook's security and privacy breaches in 2019
- 7 unexpected Cyber threats
- Most organizations plan to increase their cybersecurity budgets in 2020
- Police interrogate Alexa for clues in fatal spear-stabbing
- Microsoft announces Azure Quantum, a cloud quantum computing service
- Scammers Exploiting Firefox Bug
- Ransom Attacks In Spain
- APT41 Group Monitor SMS
- 700,000 Old Windows Computers Exploited
- Government Officials Hacked Via WhatsApp
- smart devices not too secure
- Encrypted Phones Sold By Crime Lords
- iPhone Update
- Phishing Scam
- United States and Taiwan run cyber war exercises
- Homeland Security and Federal Government gaming to test hack possibility's
- Esports tournaments at risk from cyber security threats
- Breach affects thousands of Home Group customers
- Watchdog Sues FBI Over Facial Recognition Secrecy
- Two unpatched RCE flaws in rConfig software expose servers to hack
- A private DNA ancetry could be at risk
- Salary Increase Phishing Email Leads To Stolen Employee's Credentials
- ?Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns
- Marriott associate's social security numbers exposed
- Malware is targeting android smartphones
- Gafgyt variant exploits 3 devices to target game servers with DDoS attacks
- Trojan Brings a Scare with Halloween Emails
- fraudulent scheme used to get money from people using cash app techniques
- smart bulbs used in homes could now be use to hack your personal info
- Financial firms have major Cyber RIsks
- whats app gets hacked
- A Public School in Las Cruces Ransomware Attack
- UniCredit data breach impacts 3 million Italians
- The Malware Targeting Indian Financial Institutions
- Hackers Attack Nuclear Plant in India
- SmartBulbs– Not so Smart.
- TikTok says no, senators, we’re not under China’s thumb
- City of Johannesburg Refuses to Pay Ransom to Hackers
- Facebook Sues NSO CyberSecurity Company over a WhatsApp Hack
- Malware Targeting Financial Institutions
- Hackers using ads with fake giveaways
- ?Apple removes malicious iOS apps infected with clicker trojan
- xHelper Trojan Reinstalls Itself After Removal
- DDOS Mitigation
- China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecur
- ?Scammers are focusing on Cash App clients with counterfeit 'free-cash'
- Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attack
- Magecart Gang Targets Skin Care Site Visitors For 5+ Months
- Russian Hackers Are Still Targeting the Olympics
- Hotel in japan apologizes for letting video cams getting hcaked
- Closing the cybersecurity skills gap
- Country Of Georgia Faces Massive Cyber-Attack on Websites
- Microsoft launches ‘911’ on-demand service for emergency security threats
- SOC vs. NOC – Outsourcing
- "What is the dark web? How to access it and what you'll find"
- "Why Cops Can Force You to Unlock Your Phone With Your Face"
- Kalispell Regional Hospital affected by Phishing Scam
- Smart Speakers Eavesdrop?
- Experts Warn Not to Use Public Wifi In National Cyber Sec. Awareness Month
- Skimming has now been us online
- Hacker in N.J. Admits Breaking Into 2 Companies
- NOLS Ransomware
- An agency in Germany declares Firefox as the safest internet browser
- Doug Jacobson on recruiting cybersecurity students
- Swedish Police Cleared to deploy spyware against crime suspects
- Jackson Health to pay massive fine
- FBI issues warnings
- Samsung releases fix for Galaxy S10 due to fingerprint glitch
- human error has been, and will continue to be the reason for security issues
- Discord being turned into a backdoor for information stealing due to new malware
- A new ransomware called "MedusaLocker" has been infecting victims worldwide
- Who need strength when you have advances technology on your side?!
- Hacker are trying to bring down ISP in South African
- Iranian Hacking Group Targeted The American Satellite Technology Industry
- Woman ordered to type in iPhone passcode so police can search device
- Discord Turned Into an Info-Stealing Backdoor
- Hackers tagert hotel guests through cams
- "Ransomware Hits B2B Payments Firm Billtrust"
- Icon-Hiding Android Adware Returns to the Market
- United Kingdom Company Nominet launches new partner Velocity
- A "Critical" Bug Found In Linux
- Wifi Vulnerability found in Linux
- U.K. Repelled 600 Cyber Attacks This Year
- Montville man pleads guilty to hacking tech companies
- Robots In Japanese Hotel Chain Found To Be Vulnerable To Hacking
- Door Dash Hacked
- Ransomware on the rise compared to previous years
- Unauthorized access to computer
- Hackers small companies as an easy target
- Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested
- Cyber Insurance Will Reshape Cyber security
- Lack of cyber security talent is a national security threat
- After ransomware attacks on cities, IBM offers free cyber security training
- How a lack of cyber security made a Chicago broker loose 1.5 million
- A Year in Cybersecurity
- Autoclerk's hotel booking data breached.
- Pentagon Thwarts 36 Million Malicious Emails Every Day, Navy Cyber Defense Opera
- Major Chinese browser ‘Maxthon’ has a bug that allows anyone admin access
- Gweillian Frank hit by 2m cyberattack
- CyberAttack on Amazons website
- States With the Best Online Privacy Laws
- Russian hackers use Iranian hacking tools to launch attacks
- Stolen credit card vendor "Briansclub" has been hacked
- NordVPN was hacked
- 36 Million Malicious Emails
- Outdated OSs Still Present in Many Industrial Organizations
- Cybercriminals Have Made A Lot Of Money Off Of Ransomware
- Cybersecurity: Hostile nations responsible for attacks against UK organizations
- Russian hackers cloak attacks using Iranian group
- Avast Target of Cyber-Security Attack, Company and Czech Counterintelligence Say
- High-profile Ransomware That Helped Attackers Make Massive Profits For Its Opera
- Fake Plugins on WordPress Sites Allow Backdoor Access
- House Committee meets to protect election for 2020
- Avast cyber attack in the Czech Republic
- Alexa and Google Home abused to eavesdrop and phish passwords
- 5 cyber security threats you didn’t know you should be threatened by
- "A Day in the Life of a Cyber Security Analyst"
- "How Do Cybercriminals Get Caught?"
- "9 cyberattacks that threatened officer safety and obstructed justice"
- Texas University to be the first to offer cybersecurity degree for Healthcare
- High School student hacked College Preparation Website
- "NordVPN reveals server breach that could have let attacker monitor traffic"
- SIM-Jacking
- Torjanized Tor Browser
- Malicious Photo app
- CentruryLink customer records exposed
- Face Unlock Bug found in the Google Pixel 4
- Open database leaked 179GB in customer, US government, and military records
- CBP mulls facial recognition tech for body cams
- Tech Giant Releases a USB Type C Security Key
- Cisco Aironet Wifi Access Points Remotely Vulnerable To Certain Security Flaws.
- Malicious Bug was found on Mission Health website
- Trump Campaign Website left open for attacks
- Sextortion Email sent by Phorpiex Bots causes scammers to earn $20,000
- Equifax used ‘admin’ as username and password for sensitive data
- Largest U.S. Government Utility Company
- Massachusette's bulking up on cyber security
- Germany's cyber-security agency recommends Firefox as most secure browser
- MSPs face increased risks and opportunities to rethink cybersecurity
- Wichita Lawyer guilty in cyberattacks
- Cozy Bear hackers have been caught perpetrating a years-long campaign
- USB-C password security
- people are creating fake presidential domains
- Wichita Lawyer Pleads GuiltyTo Being Involved in Cyberattack
- Windows® 7 is Becoming Even Riskier, Malware up by 71 Percent
- faceBook is now paying users to report security flaws
- Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products
- Spies hacked Moroccan activists amid crackdown on protests: researchers
- Scam That Compromises Servers And Links To Target LinkedIn Users
- Stripe Users Targeted in Phishing Attack That Steals Banking Info
- get back stolen data
- Fake videos could influence the 2020 election
- WAV audio files are now being used to hide malicious code
- Cyber Attack on Iran Order by US
- German test shows Firefox to be most secure broswer
- Twitters Misuse of User Details
- Thousands of Retailers Affected
- 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget
- Australian CEOs are too overoptimistic for cybersecurity
- Cryptojacking worm infects over 2000 systems using Docker to mine Monero
- Mozilla Reduces Injection Attack Risk for Firefox Users
- iPhone jailbreakers lured to click fraud site
- A Deepfake Deep Dive into the Murky World of Digital Imitation
- Scammers are finding new ways to scam people with the new IOS jailbreak.
- The Need For A Breakthrough In Cybersecurity
- 26 Million Stolen Credit Cards Rescued from Hack on "BriansClub"
- "FBI says elderly and romance cyber scams on the rise"
- Securing the digital Economy
- Major SUDO Flaw
- How Blockchain Will Solve Some of IoT's Biggest Security Problems
- Almost All Systems Used in Aviation Are Vulnerable to Attack, Researchers Say
- A fake crypto company push app that targets Mac users
- NSA Opens Doors to Reporters to Explain It's New Cyber Directorate
- Iranian Silent Librarian" Improving Tactics
- Data on 92M Brazilians found for sale on underground forums
- Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
- 250,000 User Data Is Stolen
- Apple Shares Some Browsing History with Chinese Company
- New Version Of California Consumer Privacy Act To Go Into Effect in January 2020
- Mississippi Shows Flagrant Disregard for Cybersecurity
- political camp. websites had a failing score mainly due to privacy and security
- 3 Alabama Hospital's pay ransomeware
- Hospital emails attacked in Gary, Indiana hacked and information stolen
- MacOS Tarmac Malware Distributed To Users By Clicking Malicious Ads
- Hackers Hide Behind Reliable Domains To Trick Victims
- Flaw in Cyberoam firewalls exposed corporate networks to hackers
- 140 local governments, police, and hospitals get attacked with ransomware
- Itunes update has a zero day vulnerability
- Blizzard accused of blocking users from deleting accounts amidst boycott.
- Mississippi Audit finds "Disregard" for Cybersecurity Across State
- capital one hacker accused of hacking 30 ore companies
- Justdial app, accidentally cause hackers to log in to 156 million users account
- manufacturing sector is getting attack non stop
- Most Americans Fail Cybersecurity Quiz
- 2 Charged in connection with Bell Canada Cyber Attack
- Three Chain Restaurants EFT Machines Hacked.
- Phishing incident exposes personal information of 60,000 patients
- Malware Targets Chrome and Firefox To Sniff Encrypted Traffic
- hack the army
- Most Americans Fail Cybersecurity Quiz
- Data on 92M Brazilians found for sale on underground forums
- Drone Cyber Threats
- Charming Kittens APT Group Targets Security Researchers From US and Middle East
- families with people that were in the parkland attack are threatend by male
- Google launches Password Checkup security tool
- Ransomware attacks becoming increasingly targeted and costly
- US University Offers First Ever Healthcare-Specific Cybersecurity Certification
- Is Your Smart Home Cyber Safe?
- One million people in New Zealand have there medical records exposed
- Attackers Using Social Engineering to Bypass Multi-factor Authentication, the FB
- The “Prying-Eye” Vulnerability
- Nationwide facial recognition ID program underway in France
- The Bureau Violated Privacy of American Citizens
- MageCart Hits Volusion E-Commerce Sites
- Cybersecurity Law In New York To Go Into Effect October 23, 2019
- The lack of cybersecurity talent is ‘a national security threat,’
- Cybersecurity awareness month
- Arizona is emerging as a cybersecurity powerhouse
- 7 Cybersecurity Threats That Can Sneak Up on You
- TransUnion Info Exposed in Canada
- Cybersecurity for Indonesia: What Needs to be Done
- Words With Friends
- DoorDash hack reveals data of nearly 5 million people
- Google throws up red-flag over Zero-day bug
- "Why Does the Law Enforcement Industry Need Security Awareness?"
- Uzbekistan Nation-State Hackers Bad OPSEC
- FBI Investigating 2018 Voting App Hack
- What Happens When Cybercriminals Let Their Guard Down
- Google brings Incognito mode to Maps
- MIcrosoft states Iranians tried to hack U.S. presidential campaign
- Business Email Compromise Scam
- Companies Still Falling for Email Scams
- AG Barr, Officials to Facebook: Don’t Encrypt Messaging
- PayPal Scam That Has Been Stealing Details
- How Incognito Google Maps Protects You—and How It Doesn't
- EA Website loses data for 1,600 FIFA 20 pro gamers
- Recent Ransomware attack has caused certain health systems to deny patients
- Ransomware attacks increasingly targeted and more costly
- The lack of cybersecurity talent is ‘a national security threat,’ says DHS offic
- 802.11ax (Wi-Fi) on the rise
- Stalkerware
- New CPU Memory protects against attacks
- US authorities seek access to Facebook encrypted messaging
- whatsapp exploit allows hackers to gain unauthorized access to devices
- apple cable can be used to hack a computer
- Attacks on UK authorities
- Egyptian Government Suspected of Cyberattack.
- 218 million Words With Friends players lose data to hackers
- Evil Lightning cable about to hit mass distribution
- Uncovering the Rising Evil of Stalkerware
- The NSA creates organization to protect the country's cyber world
- FDA Releases Statement About Medical Technology Being Vulnerable to Hacking
- Equifax, Words with Friends and beyond: Every major security breach and data hac
- Uncovering the Rising of Evil Stalkerware
- 10 hospitals attacked by randsomware
- Devs of FarmVille had data stolen from their most popular mobile app
- Outlining the threat landscape for encrypted connections
- 6 Government initiatives in 2019 that boosted Cyber security
- Medical Practice group closes after Ransomeware attack
- Hackers Hold Computers of 23 Texas Towns For Ransom
- Here's what went wrong in Baltimore ransomware attack that cost the city over $1
- Internet Explorer
- Browser bugs exploited to show a billion ads
- Making old devices less sercure
- 172 malicious apps found on google play
- Cybersecurity giant Comodo can’t even keep its own website secure
- "Cyber Crime & the FBI"
- "Don’t Leave out Law Enforcement in Cybersecurity Planning"
- Rogue fears rise inside corporations as hacks evolve into 'home invasions.'
- UK man hacked women’s Facebook accounts to steal their intimate images
- Delivery App DoorDash Becomes Latest Company To Suffer Data Breach
- Former Yahoo engineer pleaded guilty to hacking thousands of accounts
- Nearly 30 Iraqi Government Websites Hacked in Largest Operation Yet
- Mass Production of O.MG Cable Can seemingly pass as Apple product
- YouTube 'influencers' get 2FA tokens phished
- Hackers are infecting WordPress sites via a defunct plug-in
- Hackers Are Stealing Medical Records and Selling Them on the Dark Web
- BlackBerry Launches New Cybersecurity Development Labs
- Spain Security Firm Probed 'for Spying on Assange for CIA'
- Wipers Disguised as Ransomware Have Become a New Weapon for Cybercriminals
- eGobbler Infects Over 1 Billion Ads In Latest Malvertising Campaign
- Illegal gambling apps snuck into Apple and Google stores
- Fake Apps
- Hacker Steals Over 218 Million Gamers Data
- Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data
- Researchers Discover New Downloader that Uses Microsoft SQL for Delivering Malwa
- U.S. Steps Up Scrutiny of Airplane Cybersecurity
- scammers spreading malware through Google Alert
- Awesome tip on how to secure your smartphone from cyber threats
- Is your sim card vulnerable to Sim Jackers?
- Networks Speed
- Mitch McConnell agreed to spend $250 million for election security
- Dunkin’ failed to protect the security of its customers
- 4G Router Vulnerabilities Let Attackers Take Full Control
- Several cities have been paying a staggering amount of ransom in 2019
- Illegal gambling apps snuck into Apple and Google stores
- Hacker breaks into a smarthome virtually
- Majority of All Cloud Misconfigurations Go Unnoticed
- doordash experiences massive security breach
- DoorDash breach affecting 4.9 million customers
- Russian man pleads guilty to financial firm hacks
- Voting Machines Still Have Vulnerabilities
- The Nodersok Malware affects thousands of Windows personal computers.
- Increase in data breaches in 2019 – could be the worst year yet
- Malicious apps on Google Play receive 2+ million downloads before detection
- do companies take cybersecurity seriously
- 27 nations ink cybersecurity pledge
- Hacker reveals soccer secrets
- North Korean Malware
- Attackers Abuse Narrator Utility to Access Windows Systems
- Malware for Android
- US Senators Approve DHS Cyber Hunt Act
- Hacker Charged with 147 crimes after revealing soccer secrets
- Hacker hacks Google home system
- Microsoft Patched A Zero-Day Vulnerability
- Hackers get chance to hack into satelite
- Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS
- 'Keep I.T. Confidential' campaign raising awareness in NHS.
- False hiring website targets veterans
- 27 Countries pledge for the promotion of responsible behavior online
- U.S. Department of Homeland Security’s (DHS)
- Caution towards Snowden book offer, Instagram and Android dangerous scams
- Windows Narrator Trojan
- Magecard group targeting l7 routers in high traffic locations
- Hacker Releases Exploit for vBulletin Zero-Day Vulnerability
- Instagram Data Leak
- Small Businesses Underestimate the Cost of Data Breaches- Report.
- Issue that impacts third-party keyboard apps in iOS 13 and iPadOS
- Only 31% of Employees Get Annual Training on Cyber Security
- A Fake Employment Site Made to Take Control of Veterans Computers.
- Scammers Impersonate Barclays Bank in a New Phishing Scam
- 27 Countries Sign Cybersecurity Pledge with Digs at China and Russia
- Instagram Phishing Scam Poses as a Copyright Warning
- LastPass Fix Keeps Last Used Passwords Safe
- 400 Million Medical Radiological Images Exposed on the Internet
- Combining Human Expertise and Automation to Close the Cyber Skills Gap
- Millions of YouTube Accounts Hijacked
- Campbell County Health Ransomware Attack
- 6 Best Practices for Performing Physical Penetration Tests
- Medical images and data left unprotected
- JP Morgan Hacker Pleads Guilty
- Remote Access Trojan Spear-Phishing Targets US Utility Firms
- Hackers might be able to hack into outdated machines making food.
- 118 Million Dollar Growth in Cyber Security Field
- The United States Air Force is welcoming authorized attacks on US satellite
- Malicious Android Apps Evade Google Play Protect
- DDoS attacks can wipe South African ISPs off the Internet
- USAF announces new information warfare entity
- USAF 10 year cyber warfare plan
- Huge Growth in Cyber Security Field
- Cybersecurity: Emerging challenge for law enforcement
- Huawei suspended from global cyber-security forum.
- WeWork unsecured WiFi exposes documents
- Physical and Cybersecurity Convergence
- Simjacker attack actively targeting various phones
- Smishing attack targeting venmo users
- Facebook Suspends Apps From 400 Developers Due To Malicious Apps.
- 27 year old hacker ordered to pay back $1.1million worth of cryptocurrencies
- “detect, respond, remediate, repeat,” is used to neutralized and disrupt (OCO)
- Hackers literally sneaking in the backdoor
- Cyber attack on Travis Central Appraisal District
- WannaCry Ransomware Still Active After 2 years of being discovered.
- New DDoS attack gets bang for a hackers buck
- 125 new flaws found in popular router brands
- City leaders must realize the value of Cybersecurity
- chrome and add bockers
- Cyber attack on Travis Central Appraisal District
- Clever New DDoS Attack
- Hackers are still breaching local government payroll portals
- Up to 20 million people in Ecuador had their personal information breached.
- google chrome vulnerabilities fixed after wednesday software update.
- Bitcoin And Crypto Wallets Are Now Being Targeted By Malware
- cookie stuffing on ad blocker in google chrome
- "Ransomware: Cyber-insurance payouts are adding to the problem, experts warn"
- Hackers target municipalities & poor Cyber Sec. can affect your credit score.
- Over 1 million Google Chrome users affected by Cookie Stuffing From Ad Blockers
- Zero Knowledge Proof
- The Air Force will let the hackers hack a Satelite
- Misconfigured Google Calendars leaking private information of thousands of users
- Smart TV's subscription services leak information to partners.
- Middle Eastern IT providers targeted by a group named Tortoiseshell
- New hacking group called "Tortoiseshell"
- Latest Windows updates patch over 80 OS vulnerabilities
- Google Calendars possibly leaking private information online
- Microsoft Phishing Page Sends Stolen Logins Using JavaScript
- U.S. cities having higher priority on cyber security rather than personal safety
- Huawei suspended from global cyber-security forum
- Russia hacked FBI to Prevent Bureau from Tracking Russian Spies in US
- Ecuador Investigates Data Breach of Up to 20 Million People
- https://www.technewsworld.com/story/86198.html
- Millions of medical records exposed online
- Blue and White Party claims website hit by cyberattack
- Security experts are saying cyber-insurance payouts are adding to the Ransomware
- DHS holds all-star cyber summit this week
- LastPass Loses Credibility As Credentials Are Leaked
- CyberSecurity Attackers Pose As Executives to earn security certificates
- U.S. Targets North Korean Hacking as Rising National-Security Threat
- US Treasury targets North Korean hacking groups
- Chicago Broker Fined $1.5m for Inadequate Cybersecurity
- Facebook, YouTube used in Brazilian Phishing Scheme
- 19 year old suspected of hacking award-winning recording artists
- Entercom infected with ransomware and demanded ransom payment of $500,000
- Attackers Infected a Radio Entercom with Ransomware and Demanded Ransom Payment
- Wikipedia Gets $2.5m Donation to Boost Cybersecurity
- North Korea Seen Using ELECTRICFISH, BADCALL Malware Variants
- North Korean Spear-Phishing Attack Targets U.S. Firms
- Google fined $170 million for violating kids privacy on YouTube.
- Aomei Backupper security?
- hackers can spy on mobile phone users using sim cards.
- new type of malware is capable of data exfiltration and spying
- Twitter Attack From Inside Of Your Phone
- 80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year
- Two Universities Targeted by Hackers
- Vulnerabilities found in Bitcoin Lightning Network
- Weekly Trends Report – 9/11/2019 Insights
- The future of cyber security in 5G
- An Unprecedented Cyberattack Hit US Power Utilities
- mohawk valley community college hit by sophisticated cyber attack
- North Korean Hackers Targeting US Entities
- How Safari and iMessage Have Made iPhones Less Secure
- Android users, has download a scam app that slow down their phone
- SIM Card Hacking
- Unprotected Elastic search database
- Violations of Children’s Privacy Law
- DNS-over-HTTPS Coming to Chrome 78
- internet gas pump can be hacked
- The Chinese face-swapping app that went viral but is dangerous
- Radio giant Entercom hacked for $500,000 ransom
- Uber fixes a vulnerability that could allow attackers to compromise users
- New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
- College student tried to hack into Trump’s taxes by creating a fake FAFSA applic
- Ransomware attack hit Souderton area school districts
- RYUK related Ransomware targeting confidential information
- Telnet Backdoor Opens More than 1M IoT radios to Hijack
- Hackers Using "Sim Swapping" to infiltrate Twitter
- Student info stolen as hacker hits Bethlehem schools
- Huawei accuses US of cyber-attacks
- Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack
- Metasploit Releases Public BlueKeep Exploit Module
- Federal IT Contractor Hacked
- LokiBot Info-Stealer Used in Spear Phishing Attack on US Company
- Attackers Distribute Sodinokibi Ransomware Via Fake Forums on Compromised Sites
- Third party (vendor) cyber assessments
- Global Wikipedia & Blizzard Entertainment – DDOS Attacks
- Weakness in Intel chips lets researchers steal encrypted SSH keystrokes
- DarkWeb IoT Cyber Attacks Are Being Used To Target Gas Pumps.
- McDonald's Annouces using a AI for taking orders
- An Unprecedented Cyberattack Hit U.S. Power Utilities
- Cyber-attack on U.S. grid, first of its kind.
- Facial Recognition Technology
- Cybersecurity: 99% of email attacks rely on victims clicking links
- 80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year
- BSA suffers data breach leading to PII of 12900 scouts leaked
- Monster.com job applicants info exposed on unprotected server
- Flagstaff school district grapples with cyber security attack
- Exim MTA Root-granting TLS Vulnerability
- High-severity zero-day vulnerability for Android OS disclosed
- Joker malware commits ad fraud, data theft
- Lubbock County IT repels malware attack on two terabytes of county documents.
- YouTube fined $170 million over child privacy violations
- New Australian Cyber Security Strategies
- Financial losses of at least $45 billion in 2018
- Cybersecurity and the Explosion of Augmented Reality
- Hackers Have Begun To Target Colleges over Business
- Why cybersecurity is a big problem for small businesses
- Could we see an attack on the 2020 election?
- MVCC cyber attack
- The Future Of Cyber Security In Teens Hands
- Why 5G requires new approaches to cybersecurity
- Cyber threat that threaten the US Bioeconomy
- Threat Intelligence Application
- Passwordless World – Adoption Issues?
- Cyberattacks on manufacturing company (Oil and Gas)
- Active Directory Security
- AI and ML used for social engineering
- Cybersecurity in Real Estate
- Most important system for broadcaster
- Cybersecurity on retail
- Gaining visibility into organizations information systems
- Security Vulnerabilities in the Film/Movie Industry
- cyberthreat against Power and utilities sector
- Cyber Security for Cloud Data Storage
- Segmenting Data on Mobile Devices?
- Data Classifications in Insurance Sector
- Insider threats
- Phishing, is training the only solution?
- Gmail / G-Suite spoof spam prevention
- DOD Secure Access File Exchange achieves Initial Operating Capability
- DOD Secure Access File Exchange achieves Initial Operating Capability
- DOD Secure Access File Exchange achieves Initial Operating Capability
- DOD Secure Access File Exchange achieves Initial Operating Capability
- USB software encryption (istar.exe) malware?
- Get Online Safety resources For Cybersecurity
- What is KM? Knowledge Management Explained
- US Census 2020 – Cyber Security and Maintaining Public Trust
- Network Visibility Tool
- Cyber Risks for ICT industry
- Rise in data theft in Australia
- Fighting Emotet
- New York ruled fake likes and followers illegal
- Flaw in macOS Mojave's privacy protection
- Google's secret microphone
- Facebook tricked kids into purchasing games without parent consent
- iPhone Hacking Tool
- Email list-cleaning site may hav leaked up to 2 billion records
- Elsevier exposes users passwords and emails online
- Government demands to know how the broadband companies follow privacy policy
- 2 Million credit cards stolen and sold on Dark Web
- Phishing Scam looks like it is coming from FBI
- New Tech Support Scam
- Unprotected database Microsoft cloud server
- Large electric transformers are subject to cyber attacks which can cause outages
- Vietnam 'on the edge' of becoming a mid-tier cybercrime hub
- The key lessons of the Triton malware cyberattack you need to learn
- Iran’s Wildest Hacker Crew Stole 13,000 Passwords From 98 Organizations
- ElectrumDoSMiner botnet infects 152,000 computers to launch DDoS attacks
- Unprotected database exposes personal details of over 80 million US families
- Should cyber-security be more chameleon, less rhino?
- Critical security bug in Qualcomm chipsets
- Several video game companies found to be infected with malware used in ShadowHam
- Amazon Flex drivers required to use biometrics for verification
- Is micro-segementation the right solution for campus security?
- Nest Cams Allowed Hackers Access
- Sea Turtle DNS Hijacking
- Scranos
- TajMahal "Swiss Army Kit" is sophisticated, of unknown origin
- What's the next multi-factor authentication for the DoD?
- Mumbai cloud server honeypot hit by 700,000 attempted attacks within a month
- Two New Jersey Secaucus High School students hacked the school’s WiFi to avoid exams
- Planetary Ransomware Decryptor Gets Your Files Back For Free
- Computer Virus adds fake tumors to scans
- Defense Industry Companies Launch Supply Chain Cybersecurity Task Force
- Researchers Show How Hackers Can Dupe Radiologists and A.I. Software
- Xiaomi's pre-installed security app Guard Provider exposes users to MitM attacks
- Office Depot scamming customers with fake computer diagnostics.
- The market for network security had the highest growth since 2012.
- Chinese woman carrying malware arrested at Trump's Mar-A-Lago Resort
- Jeff Bezos Hacked by Saudis (SecurityWeek)
- Trojan App
- Georgia Tech Data Breach Exposes Info for 1.3 Million People
- OceanLotus threat actor group leverages Steganography to deliver backdoors
- When should a company consider putting on a full time cybersecurity person
- Windows 7 support ends
- Emplyment scams top the list of computer based scams at the present time
- The Role of Machine Learning in Cybersecurity
- Dealers targeted with cyber security plan
- Hackers publish details on critical Magento flaw
- 24 year old pleads guilty for hacking into Microsoft and Nintendo
- United Kingdoms states that Huawei's cyber security practices are "a mess"
- Phone malware targets financial infastructures
- Article 13 passed by European Parliament
- DoS flaw in AC drives allows hackers control
- EU demands scrutiny of 5G risks but no bloc-wide Huawei ban
- Hackers attacked one million-plus Asus users through malicious update
- Chinese firm ordered to sell dating app to prevent blackmailing cleared persons
- People Steal Thousands of Gallons of Gas
- UK watchdog slams Huawei over ‘serious’ cybersecurity vulnerabilities
- LockerGoga Ransomware
- WInRar bug
- The 7 Biggest Cybersecurity Threats In An IoT World
- Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Comp
- Tesla Model 3 Hacked on the Last Day of Pwn2Own
- FEMA Improperly Shared Personal Information of Natural Disaster Victims
- Retail Cyber Intelligence Summit Announces Call for Speakers
- Password spraying attack on citrix
- Mac-Focused Malvertising
- Malware in Stenography
- DRONESSS!
- Fin7 is back with SQLRat Malware
- Google, Facebook fraudster pleads guilty to stealing $123 million in BEC scams
- Mueller's Report Released
- Credit card stealing code diguising itself.
- FEMA Exposes Survivors Personal Information
- Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
- Renegade Android apps can siphon off your web logins, browser history
- FDA says cybersecurity vulnerabilities found in some Medtronic devices
- NSA’s Ghidra already found to be plagued by a security vulnerability
- Multiple vulnerabilities found in Java Card
- Zero-day in WordPress SMTP plugin
- Key Cyber Security Considerations for 2019
- Facebook says it left ‘hundreds of millions’ of users’ passwords stored in plain
- vulnerability found in fujitsu wireless keyboard
- Facebook improperly stores user passwords
- Putin Passes Law Against Spreading ‘Fake News’ by Internet (Reuters)
- VERT releases security patches for Microsoft
- Microsoft: Iranian Hackers Caused Hundreds of Millions In Losses (SecurityWeek)
- Cybersecurity firms using extreme tactics for marketing
- Hackers encrypt files at a school through the use of Ransomware
- Stolen email credentials being used to pry into cloud accounts
- Report: Chinese e-retailer Gearbest leaves database exposed, endangering 1.5 mil
- Two-thirds of all Android antivirus apps are frauds
- Hamilton College faces Hack
- Congress introduces bill for IoT cybersecurity standards
- Andriod adware had nearly 150 million google play downloads before being pulled
- Cryptocurrency OneCoin are Accused of Fraud Worth Billions of Dollars
- Default account found in Cisco CSPC shows potential unauthorized access
- End of the Line for Windows 7: Open road for hackers.
- Googles New Marketing Push for Google Sign-In
- Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero
- Researchers find unsecured database with 763 million unique email addresses
- Rampant sales of SSL/TLS certificates on dark web
- Alphabet launcher first commercial cyber security product.
- Chinese hackers target 27 universities for military secrets
- Companies are flying blind on cybersecurity
- IRS warns of new tax-related phishing scams
- 8 Vulnerabilities Penetration Testers Recommend You Address in 2019
- Protect you secure information from Hackers
- Best to Worst
- Lose Battles, But Win the War: Devising a Grand Strategy for Security
- North Korean hackers target U.S. businesses
- New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers
- Cyber-thieves set sights on hijacking payment data
- Ransomware attack on Israeli users fails miserably due to coding error
- USB Killer Device
- Network Reliant Internal Software Backup
- ATM Hacking Has Gotten So Easy, The Malware's A Game
- Hackers Can Slip Invisible Malware Into "Bare Metal" Cloud Computers
- Compensating Controls for EOL Operating Systems
- Increasing Network Visibility at commercial banks
- Amazon Expanding to Seattle
- Vulnerability allows Hackers to view Airline passenger data
- A Shifty New Variant of The Qbot Banking Trojan Spreads
- DNS hijacking to steal sensitive information on the rise worldwide
- The ring doorbell could have been hacked to show fake images
- In Delhi, nearly half a million of its Citizens Personal Data was Exposed
- Team from Coast Union wins Mayors cyber cup
- Contractors and freeelancers are the cause of most workplace security breeches
- Securing the 5G future
- Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR
- IoT devices attacked faster than ever, DDoS attacks up dramatically: Netscout
- Computers vulnerable to attack through USB ports
- E-Ticketing Flaw Exposes Airline Passenger Data to hackers
- Women in CyberSecurity (WiCyS) Announces Speaker Lineup for Sixth Annual Confere
- Legislation Introduced in California to Strengthen Data Breach Notification Law
- Global Security Alliance and MasterCard Create Small Business Cybersecurity Tool
- BlackBerry completes billion-dollar security deal
- DNS and Infrastructure Attacks (Security Week)
- Fake Google reCAPTCHA image used to fool victims.
- Hacking Virtual Reality
- Cybersecurity is going to going to be an important topic for 2020 election
- Ransomware encrypts Australian cardiac clinic’s patient files
- Teenager finds vulnerability in MacOs gaining access to 2.2 billion passwords
- Understanding the potential risks associated with hackers/crackers
- WinRAR patches 19 year old security vulnerability
- Strengthening Aviation Security
- CryptoJacking becoming more popular
- Google has created an encryption program for cheap android devices
- Grid safety
- Lockheed Martin, UCF Open $1.5 Million Cyber Lab in Orlando
- Unplug Parts of the Electric Grid to Help Improve Cyber Security
- New online scam putting shoppers at card risk
- Cyber-Thieves on the rise
- Loophole allows pirated apps to be downloaded on Iphones
- Chrome will make it harder to block incognito browsing
- Israel Launches Cybersecurity Hotline for Suspected Hacking
- Accelerating America’s Leadership in Artificial Intelligence
- Linux releases a new operating system designed to help cybersecurity workers
- Australian Political Parties Targeted
- canadian films being the target of cyber attacks
- Creepy incidents with NEST cameras prompt password warning
- 80 Percent of U.S. Businesses Expect a Critical Breach in 2019
- Election Security Efforts
- WordPress vulnerability via Cost Estimation plugin. (Security Week)
- How big data & machine learning may help companies prevent cyber breaches
- Coffee meets Bagel app data breach
- A ex US Intelligence Agent charged with Spying and Helping Iranian Hackers
- Urgent need for cyber security on the grid
- VFEmail losses 17 Years worth of Emails due to cyber-attack
- Xiaomi electric scooter can be hacked and taken control of
- Turkish Police Arrest 24 Suspects Involved in Hacking Crypto Firm
- Hackers exploit emotions on Valentine's Day
- Not everything about cyber security is true
- Linux Vulnerability
- TrickBot variant steals credentials for remote computer access
- Cyber attack on Malta bank tried to transfer cash abroad
- Cyber Security Risk in Retail and How to Handle It
- STOP ransomware on the rise
- Windows Malware Runs on Macs, Bypasses Gatekeeper to Target Software Pirates
- Windows Application running on MacOS, installs malware payload in process
- Cyber Security In Retail
- Cyberattacks on Cars Are Finally Getting More Attention
- New Unpatched MacOS Flaw Lets Apps Spy On Your Safari Browsing History
- Study on Electric Grid Resiliency Finds Urgent Need for Cybersecurity Investment
- Zero-Day flaw in Adobe Reader DC
- Three major websites are facing possible security breaches
- Cybersecurity Loses Brand-Name Billing in House Intelligence Shuffle
- Mortgage Financial Information Exposed
- A New Cybersecurity Incident Strikes K-12 Schools Nearly Every Three Days
- First hacker convicted sim swapping
- Networked freezers at grocery stores are vulnerable to hacking
- Apple Squashes FaceTime Eavesdropping Bug
- 5 Cybersecurity threats Healthcare faces in 2019
- Australian Signals Directorate locks down ACSC, Parliament computer systems.
- a massive cyber security attack aka" wanna cry"
- Australia’s security agencies are urgently investigating an attempt to hack the
- Japanese government to hack citizens in the name of cyber security
- With Cyberattacks On The Rise, Current Cybersecurity Workforce Can't Keep UpWith
- Huawei 5G threatens US cybersecurity
- Stolen UK identities getting sold?
- Fortnite login flaw leaving millions exposed
- Facetime eavesdropping bug
- Which Countries Have the Worst and Best Cybersecurity?
- China’s tech giant Huawei offers to build cybersecurity center in Poland
- AS THE GOVERNMENT SHUTDOWN DRAGS ON, SECURITY RISKS INTENSIFY
- Newcastle school targeted in fees phishing scam
- RDP
- Tesla's Model 2 will be prime target at upcoming hacker contest
- Vulnerabilities Found In Smart Scale
- Programmer find ATM loophole that let him withdraw $1 million in cash
- A New Google Chrome Extension Will Detect Your Unsafe Passwords
- Cyber Security could have an AI in charge
- Recall on Child smart watch in UK
- Android phones hackable by opening a PNG image file
- Is your car hackable? USAToday
- Hackers stole nearly half a billion personal records in 2018
- NASA BATTLED CYBER SECURITY THREATS DURING GOVERNMENT SHUTDOWN
- Company loses millions due to lost password
- (ISC)² Partners with CyberUSA to Advance Cyber Education and Certification
- Hacks on Microsoft
- Google works on spotting dodgy ‘evil domains’
- Duke Energy fined $10 million for cybersecurity failures on grid
- 500 Million Personal Records were Stolen in 2018
- The Cybersecurity 202: A bank wants to recover the $81 million North Korea
- The Latest Threats to ATM Security
- Why User Names and Passwords Are Not Enough
- New backdoor discovered, targets Linux systems
- The tech skills that will be in demand in 2019
- DARPA explores new computer architectures to fix security between systems
- Super Bowl LIII luring out hackers
- Microsoft Issues Windows 10 Upgrade Warning
- Mac and Chrome Info Stealers Are Cryptomining Malware Into The "Wild"
- Digital Transformation Era is Putting Organizations’ Sensitive Data at Risk
- The Next Generation of White Hat Hackers?
- Info-Stealer FormBook continues activity using a new file hosting service
- 14-year old found Apple’s FaceTime bug before it went viral
- Consumers Abandoning brands after data breaches
- Singaporean Health Ministry Recovering From two Data Breaches.
- Japanese govt to hack citizens in the name of cyber security
- CEO's are biggest risk for cyber attacks
- Gps in smart toys poses potential threat to children
- Law enforcement agencies in the US and Europe announced the seizure of xDedic
- Why Facebook's Banned 'Research' App Was So Invasive
- Airbus Suffers Data Breach, Some Employee's Data Exposed
- Data Standards for the Air Force
- YouTube impersonation scam has tricked 70,000 people, Study reveals.
- Hacking spree reigns across Germany
- The Cybersecurity 202
- Virginia State Corporation Commission Cybersecurity Training Escape Room
- Using AI's in the Cyber Security world
- North Dakota Considers Major Cybersecurity Effort
- Cybersecurity issues of American Weapons systems
- Federal Agencies Audit their DNS security
- Apple FaceTime bug allows instant audio, potential video access
- Hackers broke into an SEC database and stole millions
- Police Take Cyber Security for More Comprehension of Cyber Crime
- Vulnerabilities in Cisco Routers
- GandCrab ransomware and Ursnif virus spreading via MS Word macros
- Global Talent Shortage is Top Emerging Risk Facing Organizations
- Calling all UK SMEs! Invitation to Participate in a PhD research
- New funding will help drive diversity in cyber security
- Human errors are the #1 reason in why they are so many cyber breaches.
- Consern with Two-Factor Authentication
- Too few cybersecurity professionals is a gigantic problem for 2019
- HPE Teaches Girl Scouts About Cybersecurity
- Your information may have been leaked from these popular retailers
- 2018 Set Record for Vulnerabilities
- Internet experiment takes down Linux routers
- DarkHydrus APT delivers RogueRobin Trojan via Google Drive
- Phishing Campaign Delivers Nasty Ransomware, Credential-Theft Two-Punch
- Government shutdown affecting Federal cyber security contractors
- MS-ISAC CYBERSECURITY ADVISORY
- Facebook’s privacy lapses may result in record fine from FTC
- Good entry level jobs for those studying cyber security
- Top USCYBERCOM Official Talks Threats to Satellites at CyberSat
- Introducing a cyber security specialist into your business
- Information System's Architecture and Cybersecurity
- Shamoon Disk-Wiping Malware Re-emerges with Two New Variants
- Marriot Hotel hacked, 500 million guests information stolen.
- Facebook privacy concerns lead to $11.3M fine
- Android Battery optimization app steals money from paypal
- Iran Hackers target U.S Congress Officials
- Apples App Store removes 3 fake health apps for security.
- Misconfigured cloud server exposed f 120 million Brazilian taxpayers ID numbers
- A New Google+ Blunder Exposed Data From 52.5 Million Users
- Wiping phone, destroying evidence?
- Trackers found in children's apps
- Figuring out who self driving cars should hit
- Phishing is still number one on attacking large companies
- Robocallers
- Misplaced USB with vital information followed by a large fine
- Lock screen figured out on Apple iOS 12
- Quora Gets Hacked
- Federal Cybersecurity Reskilling Academy Announced
- Moscow's New Cable Car System Infected with Ransomware the Day After it Opens
- Children’s smartwatches once again found vulnerable
- U.K., Dutch fine Uber $1.2 million over data breach violations
- Block puzzles open the door to malware
- Got a Sennheiser headset? You could be vulnerable.
- Marriott Hack
- marriott has a data breach
- Marriott Hacking Exposes Data of Up to 500 Million Guests
- Proofpoint customers – Advanced Geodo/Emotet Phishing Lures
- US-CERT Alert (TA18-331A) 3ve – Major Online Ad Fraud Operation
- Experts demonstrate how to exfiltrate data using smart bulbs
- New Member. Looking for some advice.
- Congress Wants To Have Federal Cyber Security Agency
- NY Gun Owners new laws
- CBC: Rogue tax workers snooping on Canadians in larger numbers
- apple teaching youngsters how to code
- android uses tricked into downloading malware from the google play store
- Cybersecurity and Infrastructure Security Agency (CISA) Act of 2018
- Tis the season! Here are some helpful articles on Holiday Cyber Safety
- Half a million Android users tricked into downloading malware from Google Play
- Data Leak at Instagram
- New Botnet Data
- Microsoft Live Session Hijacking
- Instagram bug might have accidentally leaked passwords of some users
- iPhone Hacked and Passwords Stolen in Six Minutes
- Vision Direct breach exposes customers’ personal, financial data
- russian hacker on the good side
- nothing is really deleted from a phone
- Ransomware Attack on Cloud Storage
- Judge asks if Alexa is witness to a double murder
- Vision Direct hacked!!
- Windows exploits
- new faceBOok vulnerability
- Smart phone zero-days
- iphone x can be hacked to pull recently deleted files
- Week-long federal research exercise tests DARPA-developed grid recovery tool
- Mozilla Creates Christmas List of Devices that are not Secure
- Ways to get employees to buy-into security policies
- JavaScript
- Official Google Twitter account hacked in Bitcoin scam
- japan
- Prison time, hefty fines for data privacy violations: draft U.S. Senate bill
- Cybersecurity News of the Week, October 28, 2018
- Infowars Store Affected by Magecart Credit Card Stealing Hack
- Botnet of over 100,000 growing Using 5 year old Bug
- Japan’s Cabinet Minister Who’s In Charge Of Cyber Laws, Doesn’t Use Computer
- 63 New Flaws (Including 0-Days) Windows Users Need to Patch Now
- atms are easy to hack
- THE US SITS OUT AN INTERNATIONAL CYBERSECURITY AGREEMENT
- Microsoft Patch
- Support wouldn’t change his password, so he mailed them a bomb
- Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2
- Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam
- iSH – An iOS Linux Shell for Your iPhone or iPad
- Fileslocker Ransomeware
- Cybersecurity Certification? Are CompTIA certs better than ISC2 ?
- Hacking GTA = Jail Time/Hefty Fine?
- CS Digest Assignment 10
- 258,000 encrypted IronChat phone messages cracked by police
- Apple appears to have blocked GrayKey iPhone hacking tool
- Former High School Teacher Pleads Guilty to "Celebgate" Hacking
- 258,000 encrypted IronChat phone messages cracked by police
- Data Greater Demand for Cybersecurity Professionals by US Employers
- U.S. Consumers’ Security Habits Make Them Vulnerable to Fraud
- Top banks in cyber-attack ‘war game’
- Tesco Bank fined £16.4m
- Game server DDoS attacker pleads guilty
- FileLocker – Ransomware for hire
- HealthCare.gov breach exposed personal details of 75,000, including partial Soci
- Security breach at Nordstrom exposed sensitive employee data
- Virtual Machine vulnerability
- public wifi article
- National Security Agency Science of Security Initiative
- Man sent to prison for DDoS attacks
- Voting machine manuel tells officials to reuse weak passwords
- Former cia programmer is charged for leaking classified information in prison
- Isreal accused in cyber attacks on Iran
- People Are The Biggest Security Risks
- Don't Stop, keep improving
- Virtual Box Zero-Day Vulnerability and How to protect yourself.
- Statcounter analytics code hijacked
- Issues in U-Boot Memory Handling
- DJI bug lets personal information out to the public
- Consumers making themselves more vulnerable
- North Korea hackers steal money
- Facebook Takes Down Fake Russian Accounts
- FIFA Hacked Again?
- HSBC data breach
- New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data
- Data Greater Demand for Cybersecurity Professionals by US Employers
- Facebook users’ data, private messages found up for sale online
- Children’s apps contain an average of 7 third-party trackers
- Apples T2 Chip makes it more difficult to access mics
- Security with Youth
- New software helps to identify bots driving political propaganda
- CS Digest Assignment 9
- CS Digest Assignment 8
- Russian Hackers Linked to Attempted Sabotage of Saudi Energy Plant
- The Rise of Mobile Phishing Attacks
- Agent Tesla Spyware Analysis
- Intel announces Cascade Lake Xeons: 48 cores and 12-channel memory per socket
- Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts
- Cyber Attack On New Jersey School
- Intel CPU
- Bluetooth Low Energy (BLE) chips
- Intel CPU Flaw Exploits HyperThreading to Steal Encrypted Data
- The Cybersecurity 202: Trump takes harder line on digital security…
- New Ransomware
- Apple Passcode Bypass
- Top officals think data breaches are inevitable.
- Self – driving cars
- week 8
- Bluetooth Chip Flaws
- Apple claims T2 chip can stop hackers from listening in on macbooks
- CommonRansom Ransomware Demands RDP Access to Decrypt Files
- Vulnerability allows users to easily gain access to root privilege
- new MacBooks provide an additional layer of security
- USB-C UNPLUGGED NOT SAFE FROM HACKS!!!
- Blockchain Protection
- Chinese Intel Officers Accused of stealing Aerospace Secrets
- Update Now! Apple releases security fixes for iOS, MacOS, others
- Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer
- Crypto exchange collapses, victims accuse it of exit scam
- Feds charge Chinese intelligence officers with stealing U.S. plane technology
- Are Data Breaches Inevitable?
- Teen Computer Awareness
- Mobile Phone Chargers On Attack
- Block chains won’t fix internet voting. Here's why.
- Details on TRITON Malware Attack
- US Arm Targeted
- Bushido-Powered DDoS Service Whipped Up from Leaked Code
- Facebook used by another foreign government to divide USA citizens
- US Citizens are Regularly Exposing Themselves to Cyber-Threats, Despite Concerns
- Hackers selling research from universities on WhatsApp
- Airbnb host using hidden camera
- How serious is a breach in Air Canada App?
- Agent Tesla – Malware for a fee
- Cathay Pacific data breach
- Linux Vulnerability
- Phishing Attacks are Rising up More in Fall 2018
- Philippines cyber beef up
- Privilege Escalation Flaw in Linux
- WordPress takes aim at ancient versions of its software
- British Airways Customers Affected in Cyber Attack
- Windows Zero-day
- Deprecated PHP
- New android malware
- Poorly secured SSH servers targeted by Chalubo botnet
- Russia behind attack on Saudi energy plant
- Super Micro hardware infection
- ai
- Delta Airlines got hacked
- Cathay Pacific data breach
- FilesLocker Ransomware Offered as a Ransomware as a Service
- Former high school teacher pleads guilty to hacking celebrities
- Are your jilted apps stalking you
- Google and Facebook accused of secretly tracking users’ locations
- Phishing Attacks up by 297 percent Q3
- Apple locks out graykey
- Has windows really become more secure?
- US Cyber Command Takes action on Russian Trolls
- Two in five millennials use the same password for most of their online accounts
- Cathay Pacific Suffers Data Breach Impacting 9.4 Million Passengers
- Another Windows 0-day flaw has been published on Twitter
- The Cybersecurity 202: McAfee's decision
- Hacker Discloses New Windows Zero-Day Exploit on Twitter
- 6 Growing Threats to Network Security
- OT Network Risks
- Windows Zero day
- Phishing Report
- Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
- Obamacare Sign-Up Channel Breach Affects 75K Consumers
- Internet Hacking Is About to Get Much Worse
- McAfee Tech Support Scam Harvesting Credit Card Information
- Americans Not buying from Several Brands
- Largest Cyber Attack on Iceland drivers
- Beware Of People On The Inside
- HealthCare.gov
- Tumblr Patches A Flaw That Could Have Exposed Users’ Account Info
- People giving up their information to companies
- Streaming Library vulnerability
- Bug Leaves Servers Vulnerable for 4 years
- Building a Secure Home Network
- Election Hacking
- Twitter Releases Accounts tied to Russian Influence of American Campaigns
- data science
- 30,000 of the Pentagon's service members and employees were compromised
- GandCrab Decryption Keys
- Cyber vulnerabilities in US defense systems
- New iPhone Bug Gives Anyone Access to your Private Photos
- Return of old Chinese Malware
- Federal officials say drones present an emergent cybersecurity risk
- Hacker: I’m logged in. New LibSSH Vulnerability: OK! I believe you.
- How Facebook Hackers Compromised 30 Million Accounts
- Crypoto- mining malware attacks on iPhones on the rise
- Is Google's Android app unbundling good for security
- The Old Chinese Malware Returns
- Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach
- Cyber Security Salaries Increase
- Hacked vending machine
- New York CISO: State committed to helping cyber security
- Goodbye and RIP TLS 1.0, TLS 1.1
- WhatsApp could hack your smartphone?
- Earn Cybersecurity Certification
- CA Law Change
- Medical Device Security
- Creepy Computer Future
- Pentagon gets hacked???!!
- New Technique Recycles Exploit Chain to Keep Antivirus Silent
- Fake software update turns computers into cryptocurrency miners
- Aircraft Analysis Tool Facing the Internet Exposes Airlines to Risks
- WhatsApp vulnerability thru the video call function.
- Pentagon cyber report card not good!
- NHS
- Weapon systems are an easy attack
- US Weapons Systems Are Easy Cyberattack Targets, New Report Finds
- Updating and fixing total 49 security vulnerabilities.
- The malicious chips.
- cyber problems
- Millions at risk in Webcam Vulnerability
- Adobe Fake Campaign
- New Reports Show Increased CyberThreats, User Risks Remain High
- Facebook Hack Creates Wide-Internet Failure
- Wi-Fi Standard is getting a name change.
- Hacking Forums Serve Different Purposes For Russian and Chinese Hackers
- Millions at Risk from Default Webcam Passwords
- New California for Passwords
- Security concerns for midterm elections
- Google+ hacked
- China hid tiny surveillance chips inside servers being sent to the US
- Report Finds Low Confidence in IoT Device Security by Consumers Living in Connec
- Physical concerns with an IPS
- Just Answering A Video Call Could Compromise Your WhatsApp Account
- Where Did GOOGLE+ Go?
- Pentagon aiming for the clouds Ploughs into the dirt
- The Cybersecurity World Is Debating WTF Is Going on With Bloomberg’s …
- Just Answering A Video Call Could Compromise Your WhatsApp Account
- US Advanced Weaponry Is Easy to Hack, Even by Low-Skilled Attackers
- Cyber tormentor lands 17.5 years in jail.
- GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
- Website for researching and indexing DIACAP, RMF, CCI, STIGs and SCAPs
- Attackers use voicemail hack to steal WhatsApp accounts
- Naughty Hacker Steals $38k from SpankChain CryptoCurrency
- Google plus is finally shutting down after serious vulnerability was found
- really Panera got hacked???
- MikroTik Winbox – much higher level of vulnerability
- Microsoft Security Problem
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Variations in State Data Breach Disclosure Laws Complicate Compliance
- This dark web market is dedicated to compromising your emails
- Cyber Attack
- Using Facebook To Log Into Other Accounts
- UN Word Press Site Exposes Resumes
- Port of Barcelona
- Jaxx Wallet Users
- Security breaches costing UK SMBs millions
- Facebook Security company investigated
- Cyber security tips after data breaches
- How malware can find on Mac computers
- Voting Day Fears
- Dox on the Hill
- Hacking accounts using voicemail.
- Google Making new strides in response to malicious chrome extentions
- Hackers using Instagram to sell accounts and botnets.
- danish doesn't see benefits in hacking the russian hackers
- Switching up Ransomware
- a cyber ransomware attack
- Attackers Wreaking Havoc on Farms.
- ATM tricked from Hacked Bank Servers
- 1 in 50 Emails Contain Malicious Content
- How to Work with Hackers to Make Your Company More Secure
- Chinese spies insert microchip into manufactured US servers
- New App Gives Android phones an Important Upgrade
- Apple and Amazon deny allegations by Bloomberg
- Facebook hacked
- October is National Cybersecurity Awareness Month, FBI To Offer Weekly Tips To..
- Botnet
- Facebook Breach
- Russia's constant cyber attacks
- Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
- Ghost DNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
- Cyber crime is most serious threat to businesses
- ALways try to make sure your home and/or business networks are secure.
- ALways try to make sure your home and/or business networks are secure.
- GOOGLE + Master Cards = No Offline Purchases?
- Army Strong with Cyber Tactics
- Apples lock screen being bypassed already
- How to have that difficult “stay safe online” conversation with your kids
- Danabot Banking Malware Now Targeting Banks in the U.S.
- Tinder, and others struggle to determine how Facebook hack affects their users
- San Diego
- GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
- The Facebook hack could be Europe’s first big online privacy battle
- Election Systems & Software's M650 Has Been Vulnerable to Hacking for 11 Years
- Web inventor Berners-Lee creates new privacy first way of dealing with Internet
- Cyber Security Today: Sept. 28, 2018- Canadian Gov’t Data Breaches…
- Popular taxi service, Uber has data breach.
- The latest botnet Torii is smarter than me
- Russian hackers exploit LoJack tracking to plant UEFI toolkit
- Torii – not your usual Botnet
- UEFI rootkit
- 50 Million Facebook Accounts Hacked.
- Is Payment Card Security Slipping?
- voting machines can be hacked
- Google partially reverts a controversial change
- Facebook scolds police for using fake accounts to snoop on citizens
- Russian VPNFilter is the Swiss Army Knife of Hacking
- UBER's vulnerabilities exposed
- 4GEE mini modems allows hacker to gain access to entire system
- Modern Computer's at risk of data theft due to a new Cold Boot attack
- Microsoft Adds New Tool to Azure DDoS Protection
- Cyber security
- Pangu Hackers have Jailbroken IOS 12 on Apple's New IPhone XS
- 16 year old hacks Apple
- Lojack hijack called Lojax
- New YubiKey Will Help Stop Passwords!
- Sound and Sound Device Hacking
- Vulnerabilities within Cisco
- The Cybersecurity 202
- Uber pays hackers to keep quiet
- Cyber-Securing Video Cameras
- Knowledge Management Focus Areas?
- DDoS Attack on German Energy Company RWE
- Linux Kernal Bug .
- Over 80 Cisco Products Affected by FragmentSmack DoS Bug
- The Biggest Email Security Challenge Facing Organizations Today
- Crypto Wallet Protection App Wants to Secure Your Wallets Against Malware
- Public Wi-Fi Hotspots Are Bad
- WPA2 is still the strongest wireless encryption protocol since 2006
- Is WPA2 still strongest encryption option for wireless LAN?
- Cyber Insurance
- Bristol Airport Cyber Attack
- Centralised Cyber Regulation
- Attack sequence for Magecart / magentocore card skimming
- Google says apps may scan Gmail accounts if they get user consent
- Adguard changes passwords due to hack attempt
- AdGuard adblocker resets passwords after credential-stuffing attack
- Running a phishing campaign
- New Adwind Campaign Targets Linux, Windows, and macOS
- macOS Mojave Patches Vulnerabilities, But New Flaws Already Emerge
- Pause on the Netflix & Chill
- Facebook Fight Back on Election Meddling
- Bankrupt NCIX customer data resold on Craigslist
- Facebook's Warning
- White house stepping up offense against hackers
- It's Time to Get Real about Complex, Emerging Threats
- Can a bank be 100% online without physical presence?
- Credit Card Skimming
- Credit Card Skimming
- T-Mobile Data Breach
- Firefox bug crashes your browser and sometimes your PC
- Instagram Hack
- Hackers steal $30 million in Cryptocurrency
- Visibility networks
- Government cyber security strategy
- Threats are advancing just as fast as technology is.
- Alert from FBI warns of phishing attacks against payroll accounts.
- Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer
- Cyber security
- US military given the power to hack back/defend forward
- Becareful for website links on iOS New attack found
- iOS Apps Discovered Sharing Location Data Questionably
- Preventing the Other Kind of Hack Back
- A Decade-Old Attack Can Break the Encryption of Most PCs
- BotNet Creators Sentencing or Possible work for FBI
- US to launch attacks against foreign opponents under new cyber strategy
- Credit Card Information stolen from Neweggs payment page
- Legislation Introduced to Solve Cyber Work Shortage
- IoT threat: Malware targeting connected devices has tripled in a year
- Hackers working wit the FBI.
- Hackers selling info on whatsapp.
- 2018 Worst Hacks So Far – Wired.com
- The creators of the Mirai Botnet hope to work with the FBI
- Credential Stuffing Attacks Generate Billions of Login Attempts
- British Airways Hacked – 380,000 Payment Cards Compromised
- Be Careful of Fake IRS Email’s This Time Of Year
- Future Cybersecurity threats
- Evil maid cold boot attack thougt to be solved is revived by researchers.
- British Airways code
- Sigma rules guide: threat hunting for ESM, ArcSight Command Center and Logger
- Powerful Spyware Has Spread Far Beyond Initial Scope
- Government Pay Service Compromised Due to Website Bug
- No.1 Adware Removal Tool On Apple App Store Caught Spying On Mac Users
- Threats against hospital cybersecurity & how to move forward if attacked
- Database with 11 Million Email Records Exposed
- Volkswagen, BMW and Daimler are facing an investigation into whether they held
- Midland, Ontario Canada at the Wake of a Ransomware Attack
- A browser con, an ad scam and lack of password control
- Colorado printing company forced out of business due to attacks
- New Brrr Dharma Ransomware Variant Released
- Phishing Technique uses Old Tricks
- Cyber Security Training
- Credit Freezes Will Be Fee-Free
- Half of Government, Military Passwords are Weak
- British Airways
- Google buys credit card records
- VDI isn't as secure as we think
- Dramatic Increase of DDoS Attack Sizes Attributed to IoT Devices
- Files With 42 Million Emails and Passwords Found On Free Hosting Service
- Peter Yuryevich Levashov pleads guilty
- Half of Government, Military Passwords are Weak
- MacOS warnings bypass discovered high sierra release
- which countries host the most malicious domains?
- Half of Government, Military Passwords are Weak
- Browser security hole on Macs and iPhones
- Google Secretly Tracks What You Buy Offline Using Mastercard Data
- Google Secretly Tracks What You Buy Offline Using Mastercard Data
- Microsoft released important security updates on 9/11/18
- North Korean Lazarus Group Targeting MAC users
- CS
- Cold Boot Attack
- Tesla's keyless car vulnerable to a spoofing attack
- Microsoft purges 3,000 tech support scams hiding on TechNet
- Online shopping could come at a cost
- New Python Ransomware Poses as Locky
- Google Making the Web more Secure
- Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
- Runaway Technologies and Why They're Dangerous
- Hackers slipped passed British airway defenses
- More US households had an online security breach in 2017
- Hijacked MEGA Chrome Extension
- How to Protect Against Human Vulnerabilities in Your Security Program
- CS
- The Fast-Growing Job With A Huge Skills Gap: Cyber Security
- Introduction
- The Right Professional Profile for a "Security Awareness Officer"
- Finance company
- Can Blockchain stop SPAM?
- The death of passwords
- AI, IoT and Cybersecurity – What does the future holds for Users
- Visibility of Security threats
- Identity and Access Management
- CyberSecurity for Small orgs
- are companies investing in their cyber Security Management
- digital engineering and model formalization
- How to get into Future career path in Cybersecurity
- Software Assurance for Offshore Development
- NIST Releases Final Draft of Special Publication 800-171A for public comment
- NIST Releases Second Errata Update for Special Publication 800-171 Revision 1
- Signalling System 7 Vulnerabilities in Telecom
- Future of Cyber Security
- How will cyber criminals exploit the RCE vulnerability in EOS Blockchain using S
- How Secure is AWS Authentication when using Google’s identity service for user i
- EMV Cryptogram-enabled Chip Cards Lead to 76% Drop in Payment Fraud
- Advice for career
- VPNFilter Router Malware Attack – Is Russia Up to its Common Tactics?
- How Serious is the ZipperDown iOS App Programming Vulnerability?
- Impact of Software As A Service to Cyber Security
- RSA Conference’s Cybersecurity Tech Accord – Substance or Delusion?
- Cybersecurity Management
- “Roaming Mantis” – Assessing the Impact of Android Malware on Users Worldwide
- Can a Telco be hacked?
- Syrian Electric Army (SEA) Delivers Cyber Attacks to Defend President Bashar al-
- Cyberattack vs Cyberdefence
- In the cyber-physical domain Cyber Security requires to consider both – OT and I
- The Cyber Threat Within: US FBI Identifies “Vault 7” Attack Suspect at the CIA
- Can We Expect Iran to Launch Cyber Attacks in Responsefor the US Revoking JCPOA?
- Measuring the Vulnerability of the US Power Grid to Russian Cyber Attacks
- AI Being Weaponized to Launch Next Gen Cyber Security Warfare
- The Top Five Global Cyber Security Threats for 2018
- Spartacus ransomware shows sparse features can still fight hard
- Delaware data breach resource site goes live
- NYU and NY Cyber Command team up to offer cheap cybersecurity education and trai
- Trump administration looking to rescind cyberwarfare approval process
- Drupal sites running cryptomining maleware
- Hackers Hiding Maleware in LoJack devices
- Kaspersky Labs outlines development of hacker group ZooPark
- Knox Tennessee voting hit with DDoS attack
- Andriod's new OS will prevent apps from accessing data
- Suspect Traffic Seen.
- Twitter urges users to change passwords after finding bug in password storage sy
- Microsoft fixes critical RCE bug in hcsshim library
- How Vulnerable are Cryptocurrency Wallets to DNS Attacks?
- NATO Team Wins the CCDCOE 2018 Locked Shields Cyber Warfare Competition
- CS digest Article
- Microsoft has lunch a new Windows Defender Browser Protection extension to help
- Finding & Activating Hidden Features in Windows 10 Using Mach2
- Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
- Big IoT Botnet Starts Large-Scale Exploitation of Drupalgeddon 2 Vulnerability
- The Week in Ransomware
- LinkedIn patches serious leak in its AutoFill plugin
- No secure Internet??
- CS Digest Article
- CS Digest Article
- Power Lines that has been created by Researchers capable of stealing Data
- What Can Really Happen at a Cash Register
- It is going pretty far
- Cyber Security
- Could Gamers Be The Answer?
- Advice to delete any malicious, unknown, unnecessary apps your Android Phone
- Seldom Progress Achieved on Voting Security
- New Cryptomix Ransomware variant discovered
- CS DIGEST ARTICLE
- Digital signature giant DocuSign files for IPO after fifteen years
- Boeing Malware intrusion
- Money Got Good..
- Microsoft Releases more Information about Gamarue Maleware
- Fileless Malware
- Data Breach
- Cyren reports crypto-mining websites has jumped by 725%
- ransomware
- Banking trojan Gozi ISFB
- vulnerability
- FBI used Best Buy's Geek Squad as confidential informants
- Half million email Systems needs patched
- Preparing for near future Cyber War
- Vulnerable servers exposed, causing some easy hacking that can go bad
- Private Browsing
- Vulnerability in State Voting Sytems allow for potential hacking
- forged e-passport
- Businesses are avoiding little things that can hurt them
- Cyber Laws of War – Finally coming of age
- Apple issues again
- tips to avoid being used to mine for digital currency
- Tax Identity Theft – Part 2 – Warning signs, If you're a victim, Minimizing Risk
- A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
- Tax Identity Theft – Part 1 – The Basics
- Chaos Engineering and M&S
- Windows
- Looking for Recommendations – Patch Management
- Technical Writing class – questions – PLEASE HELP
- Data Privacy – Personal Information: Risks and Mitigation
- Data Privacy – What is the difference between privacy and security?
- Data Privacy – What is it? Why Does it Matter? Why Should I Care?
- Topic of Discussion..??
- Vulnerability Management
- Protecting systems, network and data
- Cyber Attacks in Mass Manufacturing Companies.
- Suggestions for Overview of U.S. Cybersecurity Regulatory & Compliance Landscape
- Automate ICS and SCADA vulnerability evaluation
- Automating Operational Technology (OT) vulnerability evaluation
- Thoughts on updated NIST Cybersecurity Framework (draft version 1.1)
- What are the 2018 top cybersecurity threats?
- Attacks
- Supply chain security
- Risk Management in Cyber Security
- Encryption Software
- Adversary emulation
- SEIM TM and VM
- The Year in Cybersecurity
- Suggestions for security tools
- Automated Penetration and Breach testing
- Security Monitoring in hybrid on-prem/cloud environment
- Cuckoo sandbox
- Threat Detection & Endpoint Protection
- Endpoint protection
- Thoughts on Behavioural Augmentation due to AR/VR Proliferation
- Critical Data Backups vs Cyberattacks
- Will GDPR of EU make company information more secure ?
- Corporate Response to Attacks
- Fortigate & PCI
- Scientific and practical cyber security peer reviewed journal
- DTIC Documents and Search
- Views on M&S and Machine Learning
- eSIM Cybersecurity Concerns?
- Seeking participants for Ransomware Survey
- Need Cybersecurity Expert
- Ransomware Survey
- Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure
- Use of BioMetric Devices
- Multifactor Authentication – Meeting IA-2 Controls
- DoD Announces the Launch of “Code.mil,” an Experiment in Open Source
- Potentially Massive HTTPS Leak
- Revision of NIST SP 800-171 – Ask Your Questions Now
- Looking for direction
- Cybersecurity (CS) Digest Article Suggestions
- Must an organization meet all CUI and related control enhancements in 800-171
- Reality Instead Of Hype
- Cybersecurity Incident Reporting for Government Contracts
- New FAR rule: Basic Safeguarding of Contractor Information Systems
- Artificial Coffee
- Before Computers And After Computers
- Why There Are Failures In Building Software Products
- Time To Rethink Object Oriented Programs
- Do not look for the silver bullet solution.
- Thought For Software Developers
- Out dated software technology by government
- The Lessons Learned The DoD Forgot To Write
- Better User's Interfaces
- The Never Ending Computer Languages
- CUI on Corporately Owned Networks
- Welcome to the Software Intensive Systems Engineering forum!
- Welcome to the Knowledge Management & Information Sharing forum!
- Welcome to the Modeling & Simulation forum!
- Welcome to the Cybersecurity Forum!
KM Policy Charts
KM Policies
- U.S. OMB Memo – Anti-deficiency Act Implications and Certain Online Terms of Service Agreements
- DoD Instruction 8170.01 Online Info Mgmt & Electronic Messaging
- IRM 2300-11A Enterprise IT Service Management Knowledge Management Process Guide
- MCTP 3-30B Information Management
- AFSC 3D0X1 KM – Career Education and Training Plan
- DON CIO Memorandum – Acceptable Use of DoN Information Technology
- FM 6-01.1 Knowledge Management Operations
- NIH Plain Language Online Training
- OPM Plain Language Guide
- GAO IT Management Best Practices
- AFM 33-396 Knowledge Management
- Department of Navy Knowledge Management Strategy
- AR 25-1 Army Information Technology
- CJCS Knowledge and Information Management
- NATO Communication & Information Agency Knowledge Management Strategy
- OPM Strategic Information Technology Plan
- OPM Digital Government Strategy
- MCRP 3-40.2B Internet Tactical Chat in Support of Operations
- AFTTP 3-2.77
- NTTP 6-02.8
- ATP 6-02.73 (CAC Only)
- Tactical Chat – Multi-Service TTPs for Tatical Chat – Jan 2014 (CAC Only)
- AFPD 33-3 Information Management
- HOI 33-4 HQ Air Force IM & Compliance
- AETCI 33-303 Command Enterprise IM SharePoint
- MCO 5220.13 Marine Corps Continuous Process Improvement
- AFI 38-401 (AETC Supplement) Continuous Process Improvement
- AFI 38-401 Continuous Process Improvement
- DODDIR 5010.42 DoD-Wide CPI/Lean Six Sigma (LSS) Program
- GAO Streamlining Government
- MCBUL 5210 Policy for Email Usage, Email Accout Management & Records Management on the MCEN NIPRNET
- Refer to DoN CIO Memorandum Acceptable Use of DoN Information Technology
- AR 25-13 Army Telecommunications & Unified Capabilities
- MCO 5231.3 Marine Corps Data Strategy
- DoN strategy for Data and Analytics Optimization
- Army Data Strategy
- OPM Open Government Plan
- MCO 5210.11F Marinie Corps Records Management Program
- USAF Records Management Program
- SECNAVINST 5210.8F DoN Records Management Program
- SECNAV M-5210.1 Rev. 1 DoN Records Management Manual
- AR 25-400-2 The Army Records Information Management System
- AFI 33-332 Guidance Memo to Air Force Policy and Civil Liberty Program
- SECNAVINST 5211.5F DoN Privacy Program
- DoDR 5400.11-R DoD Privacy Program – Regulation
- DoDD 5400.11 DoD Privacy Program
- DoDI 5400.16 DoD Privacy Impact Assessment Guidance
- DoDM 5240.01 Procedures of U.S. Intelligence Activities
- Executive Order 12333 U.S. Intelligence Activities
- Privacy Act of 1974 with Overview/2015 Edition
- CMC White Letter 1-17 Recent Conduct on Social Media
- MARADMIN365/10 Social Media Guidance
- AFI 35-107 Public Web and Social Communication
- SECNAVINST 5720.44C Public Affairs Policy & Regulations
- U.S. OPM Social Media Policy
- OPM Open Government Plan
- Department of Justice E-Government Act of 2002
- Title 40 U.S.C. 25 Information Technology Mgmt
Certifications
- U.S. Army Functional Area 57 (FA57)
- Architecture Tradeoff Analysis Method Leader
- CERT-Certified Computer Security Incident Handler
- SEI-Certified PSP Developer
- Certificate in Knowledge and Innovation Management (CKIM)
- Certificate in Knowledge and Innovation Management (CKIM) – Distance Learning Program
- Certificate in Knowledge and Innovation Management (CKIM) – In-House
- Certified Chief Information Security Officer (C|CISO)
- Certified in Risk and Information Systems Control (CRISC)
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Security Professional (CISSP)
- Certified ISO-27000 Specialist (G27000)
- Certified Knowledge Management Professional (CKMP)
- Certified Knowledge Manager (CKM)
- Certified Knowledge Manager (CKM)
- Certified Knowledge Manager (CKM)/Certified Knowledge Environment Engineer (CKEE)
- Certified Knowledge Manager (CKM)/Knowledge Economics
- Certified Knowledge Practitioner (CKP)
- Certified Knowledge Specialist
- Certified Modeling & Simulation Professional (CMSP)
- Certified Software Development Associate (CSDA)
- Certified Software Quality Engineer
- Cisco Adaptive Security Appliance (ASA) Specialist
- Cisco Certified Architect (CCAr)
- Cisco Certified Design Associate (CCDA) Certification
- Cisco Certified Design Expert (CCDE) Certification
- Cisco Certified Design Professional (CCDP) Certification
- Cisco Certified Entry Networking Technician (CCENT)
- Cisco Certified Entry Networking Technician (CCENT) Certification
- Cisco Certified Internetwork Expert (CCIE) Data Center
- Cisco Certified Internetwork Expert (CCIE) in Routing and Switching
- Cisco Certified Internetwork Expert (CCIE) Security
- Cisco Certified Internetwork Expert (CCIE) Storage Networking
- Cisco Certified Network Associate (CCNA) Certification
- Cisco Certified Network Associate Security (CCNA Security)
- Cisco Certified Network Professional (CCNP) Certification
- Cisco Certified Network Professional Security (CCNP Security)
- Cisco Firewall Security Specialist
- Cisco Intrusion Prevention System (IPS) Specialist
- Cisco IOS Security Specialist
- Cisco Network Admission Control Specialist
- Cisco Virtual Private Network (VPN) Security Specialist
- CMIIS (CMII Software) Certification
- CompTIA Advanced Security Practitioner (CASP)
- CompTIA Cloud Essentials
- CompTIA Linux+
- CompTIA Network+
- CompTIA Security+
- Cybersecurity Forensic Analyst (CSFA) Certification
- e-Certified Knowledge Manager (eCKM)
- E-Certified Knowledge Practitioner
- E-Certified Knowledge Specialist
- GIAC Assessing and Auditing Wireless Networks (GAWN)
- GIAC Certified Enterprise Defender (GCED)
- GIAC Certified Firewall Analyst (GCFW)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Certified Forensic Examiner (GCFE)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Certified Project Manager (GCPM)
- GIAC Certified UNIX Security Administrator (GCUX)
- GIAC Certified Web Application Defender (GWEB)
- GIAC Certified Windows Security Administrator (GCWN)
- GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
- GIAC Information Security Fundamentals (GISF)
- GIAC Information Security Professional (GISP)
- GIAC Legal Issues in Information Technology & Security (GLEG)
- GIAC Penetration Tester (GPEN)
- GIAC Reverse Engineering Malware (GREM)
- GIAC Secure Software Programmer – .Net (GSP-.Net)
- GIAC Secure Software Programmer – Java (GSSP-JAVA)
- GIAC Security Essentials Certification (GSEC)
- GIAC Security Leadership Certification (GSLC)
- GIAC Systems and Network Auditor (GSNA)
- GIAC Web Application Penetration Tester (GWAPT)
- Master Certified Knowledge Managment Professional (MKMP)
- Social Media Security Professional
- U.S. Army Career Program 36 (CP36)
- U.S. Army Functional Area 57 (FA57)
- Wireless Communication Engineering Technologies (WCET) Certification
Reference Documents
- US-CERT CISA: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad
- NIST Invites Comments on Draft Special Publication (SP) 800-207, Zero Trust Architecture
- DOD Digital Modernization Strategy
- Executive Order on America’s Cybersecurity Workforce
- Worldwide Threat Assessment of the US Intelligence Community
- National Cyber Strategy – September 2018
- NIST Releases Draft Update of the Risk Management Framework: Special Publication 800-37 Revision 2
- Report on Post-Quantum Cryptography
- Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
- NIST SP 500-325, Fog Computing Conceptual Model
- NIST Releases the Second Public Draft of Special Publication (SP) 800-125A, Security Recommendations for Hypervisor Deployment
- NISTIR 8011 Automation Support for Security Control Assessments – Volume 2: Hardware Asset Management
- NISTIR 8011 Automation Support for Security Control Assessments – Volume 1: Overview
- NISTIR 8170 DRAFT – The Cybersecurity Framework: Implementation Guidance for Federal Agencies
- Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
- DHS Study on Mobile Device Security
- Report on Lightweight Cryptography
- Symantec Ransomware Report
- NJ Cybersecurity Ransomware Threat Profiles
- The ICIT Ransomware Report
- Tackling the Ransomware Threat
- Ransomware Local Government Management Guide
- Understanding Crypto-Ransomware
- CERT Insider Threat Publications
- The Insider Threat: An Introduction to Detecting and Deterring an Insider Spy
- Comply to Connect
- Benjamin Foulois Cyber Proving Ground (CPG)
- Cyber Supply Chain
- NIST Special Publication 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
- GRIZZLY STEPPE – Russian Malicious Cyber Activity
- NIST – Safer, Less Vulnerable Software Is the Goal of New NIST Computer Publication
- Marking Controlled Unclassified Information Rev 1.1 (Marking Handbook)
- Common Sense Guide to Mitigating Insider Threats, Fifth Edition
- NIST Releases Baldrige-Based Tool for Cybersecurity Excellence
- Controlled Unclassified Information (CUI) Notice 2016-01: Implementation Guidance for the Controlled Unclassified Information Program
- Information on Current and Future States of Cybersecurity in the Digital Economy
- Intelligence Information Sharing
- Promoting Private Sector Cybersecurity Information Sharing
- National Strategy for Information Sharing And Safeguarding
- Cyber Threat Intelligence Integration Center
- White House Summit on Cybersecurity and Consumer Protection
- Middle Class Economics: Cybersecurity
- The Comprehensive National Cybersecurity Initiative
- Cyber-Insurance Metrics and Impact on Cyber-Security
- International Strategy for Cyberspace
- Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information
- Presidential Policy Directive: Critical Infrastructure Security and Resilience
- Presidential Policy Directive Signals Intelligence Activities
- Cybersecurity National Action Plan
- New Commitments to Accelerate the Safe Integration of Unmanned Aircraft Systems
- United States Cyber Incident Coordination
- Digital Signature Standard (DSS)
- Secure Hash Standard (SHS)
- Mobile Application Sign-On For Public Safety And Public Responders
- DRAFT The Technical Specification for the Security Content Automation Protocol (SCAP)
- DRAFT [Concept Paper] Identity and Access Management for Smart Home Devices
- DRAFT Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist
- DRAFT SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash
- Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
- DoD Information Analysis Centers (IAC) Multiple Award Contract (MAC) Government-Industry Day Presentation
- NIST Released the Second Draft Special Publication (SP) 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems
- An Insider Threat Indicator Ontology
- DOD CIO, Through DISA, Releases Cloud Security Requirements Guide Update
- ICS-CERT Advisory (ICSA-16-070-01) Schneider Electric Telvent RTU Improper Ethernet Frame Padding Vulnerability
- Safety-Critical (SC) Systems
- Monitoring Software-Intensive System Acquisition (SISA) Programs
- Managing Operational Resilience
- Managing Intellectual Property in the Acquisition of Software-Intensive Systems
- Agile at Scale (AAS)
- NIST Released Draft Special Publication 800-180, NIST Definition of Microservices, Application Containers and System Virtual Machines
- FAA Unveils Effort to Expand the Safe Integration of Unmanned Aircraft
- Federal Aviation Administration: B4UFLY Smartphone App
- NIST announces the Release of Special Publication 800-57 Part 1 Revision 4, Recommendation for Key Management, Part 1: General
- NIST Released NIST Interagency Report (NISTIR) 8055, Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research
- IAD CNSA Suite and Quantum Computing FAQ
- NIST Released the Second Draft Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation
- NIST Announces: Draft NISTIR 8011, Automation Support for Security Control Assessments – Volume 1: Overview and Volume 2: Hardware Asset Management
- NIST Released the following 2 Draft Special Publications (SP): (1) Draft Special Publication (SP) 800-156, Representation of PIV Chain-of-Trust for Import and Export, and (2) Draft Special Publication 800-116 Revision 1, A Recommendation for the Use of PI
- SP 800-152 (Third Draft) A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)
- DoD Cybersecurity T&E Guidebook
- DoD Program Manager’s Guidebook for Integrating the Cybersecurity Risk Management Framework (RMF) into the System Acquisition Lifecycle
- NIST Announced the Withdrawal of Six Federal Information Processing Standards
- NIST Computer Security Division Plans to update Special Publication 800-126 and also design SCAP 1.3
- NIST SP 800-73-4: Interfaces for Personal Identity Verification
- NIST Interagency Report (NISTIR) 8014, Considerations for Identity Management in Public Safety Mobile Networks
- NPS: Unmanned Systems Sentinel Summary
- Department of Defense (DoD)-Defense Industrial Base (DIB) Cybersecurity (CS) Activities
- NIST IR 8074: DRAFT Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
- NIST IR 8053 DRAFT De-Identification of Personally Identifiable Information
- DOT&E FY2014 Annual Report
- NIST Requests Comments on FIPS 186-4, Digital Signature Standard
- DISA Best Practices Guide for DoD Cloud Mission Owners
- NIST IR 7904 DRAFT (Second Draft) Trusted Geolocation in the Cloud: Proof of Concept Implementation
- NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification
- NIST SP 800-171 DRAFT Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (Final Public Draft)
- FEDERAL FACILITY CYBERSECURITY: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems
- US CERT- Alert (TA15-286A) Dridex P2P Malware
- NIST Requests Comments on Using ISO/IEC 19790:2012 as the U.S. Federal Standard for Cryptographic Modules
- NISTIR 7863: Cardholder Authentication for the PIV Digital Signature Key
- The Department of Defense Cyber Strategy
- NIST IR 8060 DRAFT Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
- Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies
- NIST IR 8060 DRAFT (Second Draft) Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
- NIST SP 800-82 Revision 2, Guide to Industrial Control Systems (ICS) Security
- NIST SP 800-161 – Supply Chain Risk Management Practices for Federal Information Systems and Organizations
- NIST RFI – Views on the Framework for Improving Critical Infrastructure Cybersecurity
- NIST Cryptographic Standards and Guidelines Development Process (Second Draft)
- NIST Special Publication 800-176, 2014 Computer Security Division Annual Report
- NIST Computer Security Resource: Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard
- Preferred Use of DoD Information Analysis Center Contracts
- Operation of the Defense Acquisition System
- NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
- NIST Special Publication 800-88, Revision 1, Guidelines for Media Sanitization
- Combating the Insider Threat
- DoDI 8500.02
- NIST Special Publication 800-88 Guidelines for Media Sanitization
- US-CERT Bulletins
- Cyber Security of Critical Infrastructure
- CNSS Advisory Memorandum Information Assurance
- US-CERT Alerts
- Department of Defense (DoD) Senate Appropriations Bill
- RIAC SPECIAL ISSUE: DoD BETTER BUYING POWER
- NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations
- Special Publications (sp) – (800 series)
- Security Configuration Guides (Operating Systems)
- Security Configuration Guides (Applications)
- System Level IA Guidance
- Security Configuration Guides (Fact Sheets)
- Security Configuration Guides (Archived Security Configuration Guides)
- Security Configuration Guides (Industrial Control Systems (ICS))
- Guidance, Rationale, & Interoperability Modalities for the RPR FOM (GRIM 1.0)
- Systems and Software Engineering – System Life Cycle Processes
- A Case Study for Better Buying Power: Information Analysis Centers of the Defense Technical Information Center
- Information Technology – SEDRIS – Part 3: Transmittal Format Binary Encoding
- Information Technology — Process Assessment — Part 6: An Exemplar System Life Cycle Process Assessment Model
- Information Technology – Computer Graphics, Image Processing and Environmental Data Representation – Environmental Data Coding Specification (EDCS) Language Bindings – Part 4: C
- Quality Management Systems – Requirements
- Information Technology – Software Engineering – Guidelines for the Adoption of CASE Tools
- Information Technology – Process Assessment – Part 7: Assessment of Organizational Maturity
- IEEE Standard for System and Software Verification and Validation
- Information Technology — Computer Graphics and Image Processing – Spatial Reference Model (SRM) Language Bindings – Part 4: C
- Systems and Software Engineering – Measurement Process
- Information Technology — Process Assessment — Part 8: An Exemplar Process Assessment Model for IT Service Management
- An Illustration of the Concepts of Verification and Validation in Computational Solid Mechanics
- Information Technology — SEDRIS — Part 2: Abstract Transmittal Format
- Systems and Software Engineering — Life Cycle Processes — Risk Management
- Information Technology – Process Assessment – Part 5: An Exemplar Software Life Cycle Process Assessment Model
- Software Engineering – Recommended Practice for the Internet – Web Site Engineering, Web Site Management, and Web Site Life Cycle
- Space Data and Information Transfer Systems – Open Archival Information System (OAIS) – Reference Model
- IEEE Standard for Configuration Management in Systems and Software Engineering
- 3GPP LTE Security Aspects
- Software Engineering — COSMIC: a Functional Size Measurement Method
- Systems and Software Engineering — Life Cycle Management — Part 3: Guide to the Application of ISO/IEC 12207
- Information Technology – Process Assessment – Part 10: Safety Extension
- IEEE Standard for Software and System Test Documentation
- Information Technology – SEDRIS Language Bindings – Part 4: C
- Information and Documentation – Managing metadata for records – Part 3: Self-assessment Method
- Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and Software Quality Models
- Information technology – SEDRIS – Part 1: Functional specification
- Software Engineering – Software Life Cycle Processes – Maintenance
- Information technology – Environmental Data Coding Specification (EDCS)
- Systems and software engineering – Systems and software assurance – Part 3: System integrity levels
- IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Object Model Template (OMT) Specification – Redline
- Information technology – Process assessment – Part 9: Target process profiles
- CUI Compliance Plans Overview and Recommendations for Departments and Agencies
- Executive Order 13556 “Controlled Unclassified Information”
- The DoDAF Architecture Framework Version 2.02
- IEEE Recommended Practice for Distributed Simulation Engineering and Execution Process (DSEEP)
- Information technology — Computer graphics and image processing – The Virtual Reality Modeling Language – Part 1: Functional specification and UTF-8 encoding
- Commercial Off-the-Shelf (COTS) Simulation Package Interoperability (CSPI) Reference Models
- IEEE Standard Classification for Software Anomalies
- IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Framework and Rules
- IEEE Recommended Practice for Distributed Interactive Simulation Verification, Validation, and Accreditation
- IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Federate Interface Specification
- Core Manufacturing Simulation Data (CMSD)
- Information and documentation – Records management processes – Metadata for records – Part 1: Principles
- Information technology – Spatial Reference Model (SRM)
- IEEE Standard for Information Technology – System and Software Life Cycle Processes – Reuse Processes
- Information technology – Open Distributed Processing – Unified Modeling Language (UML) Version 1.4.2
- Insider Risk Evaluation and Audit
- Best Practices for Mitigating and Investigating Insider Threats – Raytheon Whitepaper
- Information and documentation – Managing metadata for records – Part 2: Conceptual and Implementation Issues
- Software and systems engineering – Software measurement – IFPUG functional size measurement method 2009
- Information technology — Process assessment — Part 4: Guidance on use for process improvement and process capability determination
- IEEE Standard for Information Technology-Systems Design- Software Design Descriptions
- IEEE Standard for CASE Tool Interconnections-Reference Model for Specifying System Behavior
- Information technology — Process assessment — Part 2: Performing an assessment
- Software engineering – Guidelines for the application of ISO 9001:2000 to computer software
- Military Scenario Definition Language (MSDL)
- Software engineering – Mk II Function Point Analysis – Counting Practices Manual
- Information and Documentation – Work Process Analysis for Records
- Information technology – Process assessment – Part 1: Concepts and vocabulary
- ISO/IEC/IEEE Standard for Systems and Software Engineering – Software Life Cycle Processes
- Information technology – Security techniques – Systems Security Engineering – Capability Maturity Model (SSE-CMM)
- IEEE Standard for Software Reviews and Audits
- IT Security Guidelines
- IEEE Standard. Adoption of International Standard ISO/IEC 12119: 1994(E). Information Technology – Software Packages – Quality Requirements and Testing
- IEEE Recommended Practice for CASE Tool Interconnection – Characterization of Interconnections
- Information technology – Process assessment – Part 3: Guidance on performing an assessment
- IEEE Recommended Practice for Verification, Validation, and Accreditation of a Federationan Overlay to the High Level Architecture Federation Development and Execution Process
- Federal Information Processing Standards Publication 200, Minimum Security Requirements for Federal Information and Information Systems
- Base Object Model (BOM) Template Specification
- Guide for BOM Use and Implementation
- IEEE Standard for Developing a Software Project Life Cycle Process
- Standard for: Link16 Simulations
- IEEE Standard Dictionary of Measures of the Software Aspects of Dependability
- Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations
- Knowledge management – a guide
- IEEE Standard for CASE Tool Interconnections-Reference Model for Specifying Software Behavior
- Dynamic Link Compatible HLA API Standard for the HLA Interface Specification Version 1.3
- Dynamic Link Compatible HLA API Standard for the HLA Interface Specification (IEEE 1516.1 Version)
- Federal Information Processing Standards Publication 199, Standards for Security Categorization of Federal Information and Information Systems
- IEEE Recommended Practice for High Level Architecture (HLA) Federation Development and Execution Process (FEDEP)
- IEEE Guide for CASE Tool Interconnections – Classification and Description
- IEEE Standard for Software User Documentation
- IEEE Guide for Information Technology – System Definition – Concept of Operations (ConOps) Document
- IEEE Recommended Practice for Software Requirements Specifications
- IEEE Guide for Developing System Requirements Specifications
- IEEE Standard for Software Quality Assurance Plans
- Information Technology – Guideline for the Evaluation and Selection of CASE Tools
- IEEE Standard for Functional Modeling Language – Syntax and Semantics for IDEF0
- Implementation note for IEEE adoption of ISO/IEC 14143-1:1998. Information technology – software measurement – functional size measurement. Part 1: definition of concepts
- IEEE Standard for Distributed Interactive Simulation – Application Protocols
- IEEE Recommended Practice for Software Acquisition
- IEEE Standard for Software Unit Testing
- IEEE Standard for Conceptual Modeling Language Syntax and Semantics for IDEF1X/Sub 97/ (IDEF/Sub Object/)
- Software Test Description (STD)
- Real-time Platform Reference Federation Object Model (RPR FOM 1.0)
- IEEE Standard for a Software Quality Metrics Methodology
CSIAC Reports
- Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance
- Assessing the Operational System Risk Imposed by the Infrastructure Deployment Pipeline Workflow
- Privacy Impact Assessment: The Foundation for Managing Privacy Risk
- Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design
- Hypergaming for Cyber – Strategy for Gaming a Wicked Problem
- Evolving Developments in Cyberlaw: February 2020
- Cybersecurity Issues for Security Managers: 2019
- The Internet of Things and the “Next War”
- Security-Conscious Password Behavior from the End-User’s Perspective
- Examination of Emotet’s Activities: TrickBot Takes Over as Top Organizational Threat
- Evolving Developments in Cyberlaw: June 2019
- Data Manipulation
- JFAC/DAU/CSIAC Cyber Experiment (CYBEX)
- Reducing Your Digital Footprint
- Emerging Developments in Cyberlaw: 2019
- 5th Generation (5G) Technology White Paper
- Malvertising Explored
- Cultivating Cybersecurity Talent Internally
- Learning to Win: Making the Case for Autonomous Cyber Security Solutions
- Knowledge Temple of Decision Making
- Recent Developments in Cyberlaw: 2018
- Mobile Security
- Cloud Infrastructure Deployment
- Defense Acquisition University Secure Systems Design Course Experiment
- Automation and Ongoing Authorization Transition/Implementation
- Challenges in Applying the Law of Armed Conflict to Cyberwar
- Evolving Developments in Cyberlaw: 2017
- Cloud Computing for the Government Sector
- Handbook of Software Reliability and Security Testing
- Insider Threat Workshop Proceedings: Papers and Presentations from the CSIAC Insider Threat Workshop
- Firewalls
- Vulnerability Assessment
- Use of Mobile Technology for Information Collection & Dissemination
- Cloud Computing in the Government
- Risk Management for the Off-the-Shelf (OTS) Information Communications Technology (ICT) Supply Chain
- Malware
- Measuring Cyber Security and Information Assurance
- Enhancing the Development Life Cycle to Produce Secure Software
- The Insider Threat to Information Systems
- Software Project Management for Software Assurance
- A Business Case for Software Process Improvement (2007 Update), Measuring Return on Investment from Software Engineering and Management
- Software Security Assurance
- A Comprehensive Review of Common Needs and Capability Gaps
- Software Acquisition Gold Practice: Track Earned Value
- Wireless Wide Area Network (WWAN) Security
- Embedded Software Maintenance
- Agile Software Development
- Network Centric Warfare
- Exploring Biotechnology: Opportunities for the Department of Defense
- Malicious Code
- Software Tools for Knowledge Management
- Knowledge Management in Software Engineering
- Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 2 – Details
- Modeling and Simulation for Information Assurance
- Configuration Management Compliance Validation
- COTS Based Software Development and Integration
- Using Cost Benefit Analyses to Develop Software Process Improvement (SPI) Strategies
- IA Metrics
- Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 1 – Overview
- Defense In Depth
- Data Mining
- Mining Software Engineering Data: A Survey
- Data Embedding for Information Assurance
- Object-Oriented Database Management Systems Revisited
- Using Defect Tracking and Analysis to Improve Software Quality
- Understanding and Improving Technology Transfer in Software Engineering
- Modern Empirical Cost and Schedule Estimation Tools
- An Analysis of Two Formal Methods: VDM and Z
- Software Interoperability
- A History of Software Measurement at Rome Laboratory
- Software Engineering Baselines
- Technology Transfer Across the Internet
- Software Requirements: A Tutorial
- Electronic Publishing on the World Wide Web: An Engineering Approach
- Analyzing Quantitative Data Through the Web
- The Present Value of Software Maintenance
- Software Design Methods
- Rome Laboratory Research in Software Measurement: A DACS Custom Bibliographic Search
- A Review of Non-Ada to Ada Conversion
- A Review of Formal Methods
- A State of the Art Review of Distributed Database Technology
- Artificial Neural Networks Technology
- Software Prototyping and Requirements Engineering
- Software Analysis and Test Technologies
- An Overview of Object Oriented Design
Journal Issues
- Data-Centric Environment Rise of Internet-Based Modern Warfare “iWar” – Survivability, Availability and Accessibility without Geographic Borders
- M&S Applied Across Broad Spectrum Defense and Federal Endeavors
- Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)
- Artificial Intelligence: “The Next – Nuclear Arms Race – Space Race – To the Edge”
- Launching Innovation Through Medical Modeling and Simulation Technologies Special Edition
- Innovation Based Ecosystems
- Cyber-As-Zoo: Multidisciplinary Cyber Struggle
- Insider Threat and the Malicious Insider Threat
- Serious Games to Enhance Defense Capabilities – Modeling & Simulation Special Edition
- Tools & Testing Techniques for Assured Software – DoD Software Assurance Community of Practice: Volume 2
- Design and Development Process for Assured Software – DoD Software Assurance Community of Practice: Volume 1
- Cyber Science & Technology at the Army Research Laboratory (ARL)
- Modeling and Simulation Special Edition: Wargaming
- Basic Complexity
- Focus on Air Force Research Laboratory’s Information Directorate
- Modeling & Simulation Special Edition
- Early Prevention & Best Practices
- Applying Modeling & Simulation for Defense
- Games People Play Behavior and Security
- Knowledge Management
- Understanding Cyber Risks and Security Management
- Supervisory Control and Data Acquisition
- Secure Systems and Software Productivity
- Welcome to the CSIAC
- IA on a Tight Budget
- Social Media Malware
- Cost Estimation & Systems Acquisition
- Information Assurance: Then, Now, and Moving Forward
- Cloud Computing
- Security Automation: Addressing Operational Problems
- Analyzing and Measuring Information Quality
- IA in Acquisition
- Web Technology Initatives in the Government
- International Information Assurance
- DoD and Open Source Software
- Cyber Forensics in the Cloud
- Welcome to the New DACS
- Privacy and Enhanced Information Security
- A New Layer of Security
- Defensive Cyber Security: Policies and Procedures
- Software Quality, Reliability, and Error Prediction
- Cloud Computing: Silver Lining or Storm Ahead?
- Model-Driven Development
- Security Automation: A New Approach to Managing and Protecting Critical Information
- Overcoming Cyber IA Challenges Through Better IA Policy Development and Implementation
- Information Assurance (IA) Challenges in an International Environment
- Project Management: Managing For Success
- Software Testing: A Lifecycle Perspective
- DoD Techipedia… A Way to Collaborate
- Earned Value Management: Keeping Your Project On Track
- Making GIG IA Architecture Real with AFG
- Phishing Warfare Against Armed Forces
- DoD Software Technology Challenges
- New Directions in Software Estimation
- Guarding the Cybercastle in 2020
- Intellectual Property and Software
- Defining the GIG Core
- Service-Oriented Architecture (SOA)
- Network Risk Assessment Tool (NRAT)
- Information Assurance for the Net-Centric Environment: Making the Mission Possible
- Future Directions in Software Engineering
- Implementing Internet Protocol Version 6 (IPv6) on an Army Installation
- System Engineering for the GIG: An Approach at the Enterprise Level
- Open Source
- Look out! It’s the Fuzz
- Performance Results from Process Improvement
- Phishing: Fraud for the 21st Century
- Net-Centric Software Architecture
- SAMATE’s Contribution to Information Assurance
- Generating Policies for Defense in Depth
- Functional Sizing of Real-time & Embedded Systems
- Processing Data to Construct Practical Visualizations for Network Security
- Functional Size Measurement
- Impact of International Information Assurance (IA) Standardization
- Measurement
- Net-Centric Assured Information Sharing – Moving Security to the Edge through Dynamic Certification & Accreditation
- Software Archaeology
- Secure Software Engineering
- IA Strategy: The Plan and Your Role
- Common Technology Needs and Capability Gaps Across DoD’s IA and CND Communities
- Total Electronic Migration System
- The Cyber Conflict Studies Association
- Software Reliabilty Engineering
- Ontology Development Challenges and Applications Using the DARPA Agent Markup Language (DAML)
- Software Cost, Quality and Productivity Benchmarks
- Grid Computing
- Information Assurance (IA) and Peer-to-Peer File Sharing
- The National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide
- A New Strategy – A New USSTRATCOM
- Software Quality
- The Peter Kiewit Institute (PKI)
- Training and Preparing for Net-Centric Warfare