What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2019-09-04 10:06:04 Customer personal information exposed on flight booking side, Option Way. (lien direct) A data breach at flight booking site Option Way exposed personal details on passengers and their flight and travel plans. Researchers at vpnMentor led by Noam Rotem and Ran Locar were “able to access over 100 GB of data, a massive amount of customers' unencrypted Personally Identifiable Information (PII),” including names, birth dates, gender email addresses, […] Data Breach
itsecurityguru.webp 2019-09-04 10:05:04 (Déjà vu) 562,000 users emails and passwords have been exposed due to the XKCD Forum breach. (lien direct) The forums of the XKCD webcomic created by Randall Munroe in 2005 are currently offline after being impacted by a data breach which exposed the information of 561,991 users on July 1. The compromised user information including usernames, emails, and IP addresses, as well as hashed and salted passwords stored in MD5 phpBB3 format, was added to Have […] Data Breach
itsecurityguru.webp 2019-09-04 10:04:04 (Déjà vu) SharePoint Sites Hacked to Bypass Secure Email Gateways. (lien direct) Phishers behind a new campaign have switched to using compromised SharePoint sites and OneNote documents to redirect potential victims from the banking sector to their landing pages. The attackers take advantage of the fact that the domains used by Microsoft’s SharePoint web-based collaborative platform are almost always overlooked by secure email gateways which allows their phishing […]
itsecurityguru.webp 2019-09-03 13:51:04 A Quarter Of Workers Spend A Minimum Of 3 Months A Year Secretly Surfing The Web At Work. (lien direct) A survey carried out this month by Gurucul, a security and fraud analytics technology provider, among 476 IT workers found that a quarter of people spend more than 2 hours a day surfing the web at work, equating to 10 hours a week and a mind-blowing 40 hours a month. In total, that means a […]
itsecurityguru.webp 2019-08-27 13:54:05 Dissecting BioStar2\'s Vulnerabilities: Biometric Databases As The New Target. (lien direct) By Danielle VanZandt, Industry Analyst, Security, Frost & Sullivan The significant breach and vulnerabilities recently discovered by vpnMentor researchers within Suprema's BioStar 2 database are enough to scare any potential end user away from biometric security measures. With potentially over 1 million fingerprint biometrics and user passwords exposed in the breach, BioStar 2 has become […]
itsecurityguru.webp 2019-08-23 15:22:05 ThreatConnect Users Can Access Near Real-Time Finished Intelligence And Technical Data From Flashpoint. (lien direct) ThreatConnect, Inc.®, provider of the industry's only intelligence-driven security operations platform, is proud to announce its updated integration with Flashpoint, the leader in Business Risk Intelligence (BRI). With this latest integration, joint customers can now leverage the Flashpoint API to import Finished Intelligence reports, Risk Intelligence Observables (RIOs), and Technical Indicators into ThreatConnect. The ThreatConnect […] Guideline
itsecurityguru.webp 2019-08-22 10:57:05 Sounding The Alarm: Can Your Home Security System Be Hacked? (lien direct) By Martin Hodgson, Head of UK and Ireland at Paessler A network is only as secure as the devices connected to it. With each connected device comes increased vulnerability. The modern household is no exception, with the recent explosion of IoT devices in the home creating a potential goldmine for hackers. Scarier still, many of […] ★★
itsecurityguru.webp 2019-08-22 10:57:01 Alexa: How Secure Is My Smart Home? (lien direct) By David Emm, Principal Security Researcher, Kaspersky Baby monitors, CCTV tools and smart home devices like Amazon Alexa and Google Home are all handy additions to today's modern home. A quarter of Britons now own one or more smart home devices, and by 2023 every home in the UK is expected to contain at least […] ★★★★★
itsecurityguru.webp 2019-08-22 10:56:04 UK FinTech CashFlows Continues Growth With Akamai In Face Of Increasing Cyberthreats. (lien direct) Akamai (NASDAQ: AKAM), the intelligent edge platform for delivering and securing web experiences, today announced it is protecting CashFlows, an innovative FinTech offering comprehensive merchant services, alternative payments, and BIN Sponsorship solutions (card issuing and ATMs), from the growing threat of Distributed Denial of Service (DDoS) attacks against its cloud-based services. Founded in 2010, CashFlows […] Threat
itsecurityguru.webp 2019-08-21 14:38:04 Over Two Thirds Of British Companies Feel Cybersecurity Concerns Prevent Them From Adopting New Technology. (lien direct) Over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster, according to a new report from EY that is based on a survey of 175 C-suite executives at UK-based organisations. Cloud computing and the internet of things (IoT) were the two technologies that were […]
itsecurityguru.webp 2019-08-21 14:37:03 SOAR vs. Security Operations: What\'s Really Going On? (lien direct) Written by John Czupak, CEO, ThreatQuotient There's something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us […] Threat
itsecurityguru.webp 2019-08-21 13:54:05 How To Effectively Manage Cyber Threats On Critical Infrastructure. (lien direct) Written by Anthony Perridge, VP International, ThreatQuotient Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control systems and damaged nuclear power plants. Five years later, the […]
itsecurityguru.webp 2019-08-20 17:10:05 Machine Learning And The Future Of Security. (lien direct) By Morgan Jay, Area Vice President at Imperva. We often question what drives the success behind enormous companies like Google and Amazon. A large part of the answer is machine learning. These companies have quickly adopted machine learning, finding smarter ways to apply it and changing the dynamic of how they work. With the extra […]
itsecurityguru.webp 2019-08-20 16:37:04 Five Steps To Defending Against And Recovering From A Cyber Attack. (lien direct) Given how commonplace cyber attacks have become on a global basis, the topic of cyber security is moving increasingly up the board agenda, and rightly so. 72% of large businesses in the UK said they had identified at least one cybersecurity breach in 12 months and 40% experienced a breach or attack at least once […]
itsecurityguru.webp 2019-08-20 14:35:02 Is There Room For New MSSPs To Enter The Cyber Security Market? (lien direct) Written by Bernard Parsons, CEO and Co-Founder, Becrypt While the MSSP model is far from new, and many well established MSSPs with comprehensive offerings exist, there seems to be no shortage of traditional Value-Added Resellers (VARs) still keen to transition to the model. There is still opportunity for these VARs, given the dynamic nature of […]
itsecurityguru.webp 2019-08-19 16:36:02 Demystifying Data Subject Access Requests. (lien direct) One year on from the introduction of the General Data Protection Regulation (GDPR) and it is becoming clear that when it comes to Data Subject Access Requests (DSAR), organisations are confused regarding a desire to balance the rights of an individual with the needs of an organisation, John Potts (Head of DPO DSAR and Breach […]
itsecurityguru.webp 2019-08-19 14:02:02 BlackBerry Again Positioned As A Leader In Gartner\'s 2019 Magic Quadrant For Unified Endpoint Management Tools. (lien direct) BlackBerry Limited (NYSE: BB; TSX: BB) today announced its position, for the fourth consecutive year, in the Leaders quadrant for unified endpoint management (UEM) and inclusion in the 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report by Gartner, Inc., the world's leading research and advisory company. This Magic Quadrant evaluates the ability to […] Guideline
itsecurityguru.webp 2019-08-19 12:16:04 Greenbone Introduces Virtual Appliances For Vulnerability Management. (lien direct) Greenbone, a leading provider of vulnerability analysis for IT networks, today announced that its proven portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone's customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch […] Vulnerability Guideline
itsecurityguru.webp 2019-08-19 12:15:03 Ransomware Modifications Double Year-On-Year In Q2 2019. (lien direct) Kaspersky researchers detected 16,017 new ransomware modifications in Q2 2019 – including ones belonging to eight new malware families. This is more than double the number of new samples detected a year ago, in Q2 2018 (7,620). The Kaspersky IT Threat Evolution Q2 2019 report also highlights that more than 230,000 users were attacked during […] Ransomware Malware Threat
itsecurityguru.webp 2019-08-16 17:06:03 CyCognito Platform (lien direct) Supplier: CyCognito Website: www.cycognito.com Price: Based on number of assets Scores Performance 5/5 Features 5/5 Value for Money 5/5 Ease of Use 5/5 Overall 5/5 Verdict: With data protection regulations getting ever stricter, failure is not an option. CyCognito is a new breed of security assessment platform that can keep you one step ahead of […]
itsecurityguru.webp 2019-08-16 14:00:04 Virgin Hyperloop One Selects OneLogin To Streamline Security And Access To All Enterprise Applications. (lien direct) OneLogin, the leader in Unified Access Management which delivers simple and secure application access and identity management to enterprises, today announced that Virgin Hyperloop One chose OneLogin’s cloud-based platform to improve security for all intellectual property across its enterprise applications. “We came to OneLogin to replace our outdated legacy product and needed a solution that […] Guideline
itsecurityguru.webp 2019-08-16 12:17:01 The Challenges Of Cobalt Strike Server Fingerprinting. (lien direct) By Jason Reaves, and Joshua Platt, Principal Threat Researchers at Flashpoint The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn't stopped individuals and collectives […] Threat
itsecurityguru.webp 2019-08-15 16:37:03 Kaspersky To Open First Transparency Center In APAC. (lien direct) In line with its drive towards building trust in the cybersecurity industry, Kaspersky today announces the opening of its first Transparency Center in Asia Pacific, to be hosted by CyberSecurity Malaysia – Malaysia's national cybersecurity specialist agency. The company's third code review facility will be located at Menara Cyber Axis, Cyberjaya, alongside key cyber-related government […] ★★
itsecurityguru.webp 2019-08-15 16:37:03 70% Of Financial Companies Suffered A Cyber Security Incident In The Last 12 Months. (lien direct) New research by data security company, Clearswift, reveals that 70% of financial companies have experienced a cyber security incident in the past year, highlighting the serious threat that both data breaches and malicious attacks pose to the UK's financial sector. The research, which surveyed senior business decision makers within enterprise financial organisations in the UK, […] Threat ★★
itsecurityguru.webp 2019-08-15 16:37:03 Disappointed Cyber Students Who Miss University Grades Given Free Access To Immersive Labs\' Learning Platform. (lien direct) Crestfallen cyber students who miss out on their first choices of university are being given free access to Immersive Labs' industry-leading cyber skills development platform. Backed by Goldman Sachs and developed by an ex GCHQ trainer, the technology will give students access to a purpose-built set of 'labs' which drop the user into entry-level cyber […] Guideline ★★★
itsecurityguru.webp 2019-08-12 17:17:00 Hacking campaign targets Fortnite players. (lien direct) Parents of children who watch gaming streams on Twitch or YouTube on their phones or computers may be at risk of fraud thanks to a six-month long hacking rampage that targeted gamers. Attackers offering cheats for popular games Fortnite, Apex Legend and Counter-Strike fooled victims into downloading “hit-and-run” malicious software that extracted valuable personal information […] ★★
itsecurityguru.webp 2019-08-12 17:15:04 Hacker tries to extort $3.5 million from Binance. (lien direct) An unnamed person is reportedly demanding 300 bitcoin (worth around $3.5 million) from Malta-based exchange Binance, implying that it will continue to release 10,000 photos that relate to alleged stolen know-your-customer (KYC) data in January if it fails to comply. In a statement today, Binance said it's investigating the case for “legitimacy and relevancy,” but […] ★★★★
itsecurityguru.webp 2019-08-12 17:14:04 107% rise in mobile financial attacks. (lien direct) Kaspersky, a cybersecurity firm, says the number of mobile financial attacks it detected in the first half of the year rose by 107 per cent. The firm said it observed that attackers perpetuated their acts using pseudo names of prominent financial services and banks in its latest financial threat report. Analysts at the company said […] Threat
itsecurityguru.webp 2019-08-12 17:13:04 DSLR cameras are vulnerable to ransomware attack according to reseachers. (lien direct) Check Point Software Technologies issued a report yesterday that detailed how its security researchers were able to remotely install malware on a digital DSLR camera. In it, researcher Eyal Itkin found that a hacker can easily plant malware on a digital camera. He says that the standardised Picture Transfer Protocol is an ideal method for […] Ransomware Malware
itsecurityguru.webp 2019-08-12 17:11:03 Seemingly Authentic iPhone Lightning Cables Will Hijack Your Computer. (lien direct) I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced the pop-up asking if I wanted to trust this computer. All expected behaviour. But this cable was hiding a secret. A short while […]
itsecurityguru.webp 2019-08-07 19:37:05 Tenable Expands Partner Ecosystem To Span The Cyber Exposure Lifecycle. (lien direct) Tenable®, Inc., the Cyber Exposure company, today announced the expansion of its Cyber Exposure ecosystem with new and enhanced technology integrations from leading vendors in public cloud infrastructure, SIEM and IT Service Management solutions. This news follows Tenable's announcement of new innovations to automatically discover and assess rogue assets across on-premises and cloud environments. Together, […] Guideline ★★
itsecurityguru.webp 2019-08-06 15:52:04 Cyberfort Group Launches To Support Business Growth Through Cybersecurity. (lien direct) As cyber-attacks continue to increase in sophistication, businesses urgently need to catch-up on detection and defence without compromising on commercial viability. Cyberfort Group, a new breed of cybersecurity provider, has launched to help businesses maximise growth while solving their biggest challenges with cybersecurity strategy. Cyberfort provides expert cyber advice and consultancy, alongside a comprehensive range […] ★★★★★
itsecurityguru.webp 2019-08-06 15:52:04 Tackling The Digital Identity Security Crisis With Biometric Fingerprint Technology. (lien direct) By David Orme, Senior Vice President of IDEX Biometrics ASA Digital identity, also known as an amalgamation of information available online that can bind a persona to an individual, is changing the face of personal identity as we know it. In a similar way to its physical counterpart, digital identity can be used to authorise […] ★★★★
itsecurityguru.webp 2019-08-06 15:52:04 Record Number Of Data Breaches And Associated Cost Drive 1Password Revenue Over 300%. (lien direct) 1Password, a leading password manager, today announced their B2B revenue has risen more than 300% over the last two years, as businesses rush to find solutions to rampant data and privacy breaches. A recent report from the Identity Theft Resource Center identified over 1,100 breaches in 2018, exposing over half a billion passwords. Additionally, IBM […] Guideline ★★★★★
itsecurityguru.webp 2019-08-01 09:44:04 Securonix Announces Network Traffic Analysis Product Offering. (lien direct) Securonix, Inc., a leader in next-gen SIEM, today announced the launch of its network traffic analysis (NTA) product that will provide bundled Corelight network sensors and use case content. Securonix NTA will be an integral part of the Securonix SIEM product, enabling customers to deploy a single solution that correlates network traffic, security events, and […] Guideline
itsecurityguru.webp 2019-07-29 16:06:05 LinkedIn Accounts For More Than Half Of Social Media Phishing Emails In Q2 2019, According To KnowBe4 Findings. (lien direct) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, reviewed the results of tens of thousands of simulated phishing tests over the course of Q2 2019 and found that more than 50 percent of those related to social media had “LinkedIn” in the title. With this information, organisations need to […] ★★
itsecurityguru.webp 2019-07-19 14:35:01 Malware that waits for three mouse clicks before running. (lien direct) An elusive hacking operation is using a previously unreported backdoor in a malware campaign targeting diplomats and government departments around the world. The Ke3chang advanced persistent threat group is thought to operate out of China and has conducted cyber-espionage campaigns using remote access trojans and other malware since at least 2010. Now cybersecurity researchers at ESET have identified […] Malware Threat APT 15 APT 25 ★★
itsecurityguru.webp 2019-07-19 14:34:03 Firefox to warn users when passwords have been stolen by hackers. (lien direct) You can't spend hours combing through archives of breached data to see if your login credentials were leaked, so Mozilla's rebranded in-browser password manager, Lockwise, will soon notify users if their saved usernames or passwords were exposed in a data breach, and recommend that they change them. Mozilla's feature, pointed out by TechDow based on Mozilla bug reports, is already […] ★★
itsecurityguru.webp 2019-07-19 14:33:05 Independent Age charity suffers a data breach. (lien direct) The older people's charity Independent Age has had a data security breach that resulted in personal information, including the bank details and salaries of almost all of its staff, being sent to a former colleague. Third Sector understands that the breach was on 11 June and consisted of personal information for the charity's staff being accidentally disclosed to […] ★★★★★
itsecurityguru.webp 2019-07-19 14:33:02 Half of the people of the Isle of White are at risk of cyber attack. (lien direct) More than half of Manx people risk falling foul of online scams after admitting they use the same password for several accounts, a survey has found. Nearly all respondents said they had received a fraudulent email, while only two thirds were confident in their online security. The poll also found almost 40% did not know […] ★★★★
itsecurityguru.webp 2019-07-19 14:32:05 Slack resets user passwords after 2015 data breach. (lien direct) In March 2015, the business messaging service and enterprise communications hub, Slack, was breached and a database of usernames and passwords compromised. The attackers were able to insert code to log passwords in plain text as they were typed. Unsurprisingly, Slack was quick to reset passwords of users that were confirmed to have been impacted […]
itsecurityguru.webp 2019-07-19 14:30:02 Navisite And Alert Logic Provide New Managed Threat Detection And Remediation Solution Through Expanded Global Partnership. (lien direct) Navisite, a part of Spectrum Enterprise, the enterprise-focused arm of Charter Communications, Inc., and Alert Logic, the SIEMless Threat Management™ company, today announced the availability of an enhanced, fully integrated portfolio of Managed Threat Detection and Remediation services for enterprise cloud clients. Navisite is leveraging Alert Logic's award-winning SIEMless Threat Management platform to expand security […] Threat
itsecurityguru.webp 2019-07-18 18:37:01 Symantec Introduces The Industry\'s Most Comprehensive Cloud Access Security Solution. (lien direct) Symantec Corp. (NASDAQ: SYMC), the world's leading cyber security company, today announced its new cloud access security solution to help secure cloud and internet access and use in an enterprise environment. These enhancements and integrations across Symantec's network security portfolio further position Symantec as the only security provider to offer an integrated cloud-delivered solution that […] Guideline
itsecurityguru.webp 2019-07-18 18:36:04 Perimeter 81 Launches Zero Trust Application Access. (lien direct) Perimeter 81, the leading Zero Trust Secure Network as a Service provider, announced today that it has officially unveiled its new cornerstone solution: Zero Trust Application Access. The service is designed to meet the demands of today's ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization's critical web applications, secure […] Guideline
itsecurityguru.webp 2019-07-18 18:36:01 The Evolving Nature Of Cloud Load Balancing. (lien direct) Written by Ronald Sens, EMEA Director at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it's undergoing significant changes. Let's look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and […]
itsecurityguru.webp 2019-07-18 18:31:04 AMCA data breach affects over 2 million patients. (lien direct) Another clinical lab ensnared in the AMCA data breach has come forward. Clinical Pathology Laboratories (CPL) says 2.2 million patients may have had their names, addresses, phone numbers, dates of birth, dates of service, balance information and treatment provider information stolen in the previously reported breach. Another 34,500 patients had their credit card or banking information […] Data Breach
itsecurityguru.webp 2019-07-18 18:30:05 Ransomware attack hits US ration station. (lien direct) Tampa-based community radio station WMNF 88.5-FM is stepping up cybersecurity after its computer systems were hobbled by ransom-seeking hackers last month. Interim general manager Cindy Reichard said the ordeal began June 18 when a programmer noticed a computer in one of the studios was acting strangely. The station then received a digital message: Your files […] Ransomware
itsecurityguru.webp 2019-07-18 18:30:01 Privacy implications with FaceApp. (lien direct) FaceApp, the latest viral challenge, is keeping the selfies of its users, according to its privacy policy. The app, which encourages users to age themselves after uploading pictures, was developed by a group in St Petersburg, Russia. The trend has since amassed millions of users across the world. But following security concerns, politicians have been […]
itsecurityguru.webp 2019-07-18 18:29:03 36 terabyte data breach confirmed by Lenovo. (lien direct) Lenovo has confirmed that a “high severity” security vulnerability has left users of specific network-attached storage devices with data exposed to anyone who went looking for it. How much data? How does at least 36TB grab you? That’s the number that the security researchers who uncovered the vulnerability in the Lenovo-EMC storage products put on […] Data Breach Vulnerability
itsecurityguru.webp 2019-07-18 18:28:05 Cloud security still top concern for most security professionals, (lien direct) An overwhelming majority of cyber security professionals (93%) say they are moderately to highly concerned about public cloud security, a survey reveals. Only 3% of respondents said they were not concerned, while 4% said they were slightly concerned. While 18% said they were moderately concerned, roughly the same proportion said they were “very concerned” (37%) […]
Last update at: 2024-08-01 22:20:41
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter