Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC: Information Security News - Internet Security | DShield Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

6 hours ago AWS Announces General Availability of Security Hub

SecurityWeek View Synopsis+1

Amazon Web Services (AWS) on Tuesday announced the general availability of Security Hub, a service that aggregates and prioritizes alerts from AWS and many third-party security tools.

20 hours ago Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

ZDNet View Synopsis+1
Survey of security professionals reveals that almost two thirds have considered leaving their jobs or the industry all together. So who will fill the gap?

17 hours ago US bill to force tech giants to tell users how much their data is worth

ZDNet View Synopsis+1
Bill would also force large tech companies to disclose what user data they collect and how they're monetizing it.

16 hours ago New Mac malware abuses recently disclosed Gatekeeper zero-day

ZDNet View Synopsis+1
Researchers find new OSX/Linker malware abusing still-unpatched macOS Gatekeeper bypass.

22 hours ago What the cell...? Telcos around the world were so severely pwned, they didn't notice the hackers setting up VPN points

The Register View Synopsis+1
Cybereason lifts lid on highly sophisticated long-running espionage campaign targeting phone carriers

Hackers infiltrated the networks of more than ten cellular telcos around the world, and remained hidden for years in some cases, as part of a long-running tightly targeted surveillance operation, The Register has learned.…

Top News

3 hours ago Microsoft OneDrive gets a more secure Personal Vault, plus additional storage options

ArsTechnica View Synopsis+1
Microsoft is adding a protected section to its cloud storage.

1 day ago Ex-Senate Aide Sentenced to 4 Years in Prison for Data Leak

SecurityWeek View Synopsis+1

A former congressional staffer was sentenced to four years in prison Wednesday after pleading guilty to illegally posting online the home addresses and telephone numbers of five Republican senators who backed Brett Kavanaugh's Supreme Court nomination.

1 day ago DHS: Conflict With Iran Could Spur 'Wiper' Attacks

InfoRiskToday View Synopsis+1
US Reportedly Responded to Drone Downing With Cyber StrikeIran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S. reportedly targeted Iranian computer systems in response to the downing of a surveillance drone.

1 day ago Driving Xtreme Cuts: DXC Technology waves bye bye to 45% of Americas Security divison

The Register View Synopsis+1
50 roles shifted off to India

DXC Technology is sending hundreds of security personnel from the America's division down the redundancy chute and offshoring some of those roles to low-cost centres, insiders are telling us.…

1 day ago Australia's future airport is closer than you think

ZDNet View Synopsis+1
Your biometric information will continue to be captured and the trade off is efficiency.

1 day ago Why half of enterprises struggle to keep pace with cloud security

TechRepublic View Synopsis+1
SaaS applications are supplanting traditional desktop software, and visibility into cloud workloads is a major problem, according to Symantec.

Latest News

11 hours ago McAfee sues ship-jumping sales staff over trade secret theft allegations

The Register View Synopsis+1
Complaint claims rival Tanium's hires took deal data with them

McAfee is suing former senior salespeople whom it alleges stole company trade secrets when they moved to a rival security vendor.…

11 hours ago Sen. Wyden Asks NIST to Develop Secure File Sharing Standards

InfoRiskToday View Synopsis+1
Senator Says Current Methods Offer Inadequate ProtectionsU.S. Sen. Ron Wyden, D-Ore., is urging the National Institute of Standards and Technology to create new standards and guidelines for individuals and organizations to securely share sensitive documents online. He contends current security measures are inadequate.

15 minutes ago Stop us if you've heard this one: US government staff wildly oblivious to basic computer, info security safeguards

The Register View Synopsis+1
Now for deep-diving Congress hearings... LMAO JK JK they will do nothing

A US Senate probe has once again outlined the woeful state of computer and information security within Uncle Sam's civil service.…

5 hours ago New Silex malware is bricking IoT devices, has scary plans

ZDNet View Synopsis+1
Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing.

7 hours ago Why data breaches keep happening

TechRepublic View Synopsis+1
Data breaches remain prevalent in the enterprise. Learn what companies are doing right--and wrong--when it comes to prevention.

7 hours ago Risk and Resilience: Finding the Right Balance

InfoRiskToday View Synopsis+1
Finding the right balance between risk and resilience is a challenge for every cybersecurity project - especially in the aerospace, space and defense sectors - and that's why such efforts must be driven by CISOs and CIOs, says Leonardo's Nik Beecher.

7 hours ago AWS brings native network traffic mirroring to EC2 instances

ZDNet View Synopsis+1
The new VPC traffic mirroring feature is one of multiple cloud and networking security announcements from AWS this week.

7 hours ago Hackers Favoring Shimmers Over Skimmers for ATM Attacks

SecurityWeek View Synopsis+1

Cybercriminals are increasingly using shimmers instead of skimmers in attacks targeting automated teller machines, Flashpoint reports. 

10 hours ago Companies are losing revenue opportunities and customers because of bad data practices

ZDNet View Synopsis+1
New report shows that poor data structure seems to be a significant barrier at many organizations.

10 hours ago Tales From the SOC: Healthcare Edition

SecurityWeek View Synopsis+1

Over the past ten years, I have led and supported incident response engagements across nearly every industry vertical and trained security teams of all sizes to develop and improve their detection and response capabilities. One of the first areas addressed in these trainings is understanding whether an attack is targeted or opportunistic.

10 hours ago Telcos Pwned: Multi-Wave Attacks Stealing 'Obscene Amount of Data' From Providers

SecurityWeek View Synopsis+1

China-Linked Hackers Have Breached Deep Inside Teleco Providers and Have Complete Control of Data and Networks

11 hours ago How to custom a template in Enpass

TechRepublic View Synopsis+1
Enpass allows you to create your own custom templates for even more efficient usage.

11 hours ago FedEx suing Department of Commerce over burden of enforcing Huawei blacklisting

TechRepublic View Synopsis+1
Following a series of incidents in which packages were misrouted, and under increasing scrutiny from the Chinese government, FedEx is seeking relief.