INFOSECURITY NEWSLETTER

May 22, 2019

[Blog] Are Your Third-Party Vendors Putting You at Risk? 

Ryan Clancy, deltarisk.com, May 16, 2019 

Some of the most costly and destructive data breaches happen as a result of cyber criminals taking advantage of security weaknesses in third-party vendors. So, are your third-party vendors putting you at risk? Learn more in our blog.

Read More

Google Will Work with Huawei for 90 Days After U.S. Eases Trade Restrictions

cnbc.com, May 16, 2019  

Alphabet Inc’s Google said that it plans to work with China’s Huawei over the next 90 days, shortly after the U.S. temporarily eased some trade restrictions on the world’s second-largest smartphone maker. The move marks a sudden and dramatic turnabout for the U.S. tech conglomerate.  

Read More

Secret Tracking Device Found in Navy Email to Navy Times Amid Leak Investigation Raises Legal, Ethical Questions 

militarytimes.com, May 17, 2019  

A Navy prosecutor sent an email to the editor of Navy Times that was embedded with a secret digital tracking device. The tracking device came at a time when the Naval Criminal Investigative Service is mounting an investigation into media leaks surrounding the high-profile court-martial of a Navy SEAL accused of war crimes. That email came after several months of Navy Times reporting that raised serious questions about the Navy lawyers’ handling of the prosecution in the war crimes case.  

Read More

Feds Target $100M ‘GozNym’ Cybercrime Network 

Krebsonsecurity.com, May 3, 2019  

Law enforcement agencies in the United States and Europe unsealed charges against 11 alleged members of the GozNym malware network, an international cybercriminal syndicate suspected of stealing $100 million from more than 41,000 victims with the help of a stealthy banking trojan by the same name. 

Read More

Attackers Are Messing with Encryption Traffic to Evade Detection 

darkreading.com, May 15, 2019 

Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year. 

Read More

Cyber Security Experts Fear Fallout From Apple Case 

thehill.com, May 14, 2019   

Cyber security experts are worried about the fallout from a Supreme Court ruling allowing customers to sue Apple over the prices in its App Store, claiming it could eventually lead to more unsecured apps being sold to consumers. The Supreme Court recently ruled that a group of iPhone users can proceed with their class-action lawsuit against Apple, which claims that the company’s monopoly over the downloading of apps from its App Store drives up prices. 

 

Read More

Microsoft Patches Critical Vulnerability Comparable to WannaCry 

cyberscoop.com, May 15, 2019  

Microsoft released fixes for a “wormable” remote code execution flaw reminiscent of the vulnerability that allowed WannaCry ransomware to propagate to computers around the globe in 2017. The Remote Desktop Services vulnerability, which Microsoft has rated as critical, could allow hackers to install programs, and view, change, or delete data. 

Read More

2 Million IoT Devices Vulnerable to Complete Takeover

threatpost.com, May 2, 2019  

Over 2 million IP security cameras, baby monitors and smart doorbells have serious vulnerabilities that could enable an attacker to hijack the devices and spy on their owners — and there’s currently no known patch for the shared flaws. The attack stems from peer-to-peer (P2P) communication technology in all of the Internet of Things (IoT) devices, which allows them to be accessed without any manual configuration. 

Read More

[Webinar] Battle-Tested Strategies for Supercharging Office 365

If your servers are hosted in the cloud, you’re likely cutting your network’s operational costs, but at what cost to your cyber security? Learn how you can position yourself to proactively detect and prevent security incidents before they happen by watching our on-demand webinar.

Watch Now

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points