Security researchers with Trustwave have spotted serious security flaws in four connected video conferencing products by Lifesize. The vulnerabilities could enable threat actors to remotely take …
Google Spots Attacks Exploiting iOS Zero-Day Flaws
On Thursday, Apple released iOS 12.1.4, the latest version of it's mobile operating system, which patches four discovered security holes. Two of the vulnerabilities were connected to the recently …
Continue Reading about Google Spots Attacks Exploiting iOS Zero-Day Flaws
Which Countries Have the Worst and Best Cybersecurity?
A new study by Comparitech ranking the cybersecurity performance of 60 countries, shows that there is no clear top performer and that there is ample room for improvement everywhere. The study looked …
Continue Reading about Which Countries Have the Worst and Best Cybersecurity?
Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP
Between November 2017 and September 2018, Chinese hackers stole intellectual property or valuable business information from a U.S. law firm, a large Norwegian provider of IT services and an …
Continue Reading about Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP
Pentesters breach 92 percent of companies, report claims
Findings from a new report by Positive Technologies imply that nearly all organizations can be breached. A whopping 92% of all the penetration tests carried out by the firm's researchers last year, …
Continue Reading about Pentesters breach 92 percent of companies, report claims
New macOS zero-day allows theft of user passwords
A recently published video demo shows that macOS, the Apple operating system for desktop computers, suffers from a security flaw that could enable malicious applications to access passwords for …
Continue Reading about New macOS zero-day allows theft of user passwords
Clever Phishing Attack Enlists Google Translate to Spoof Login Page
Akamai researchers have uncovered a new and unique phishing campaign. As in all phishing campaigns, the threat actors are out to obtain sensitive information from victims. In this case, they want to …
Continue Reading about Clever Phishing Attack Enlists Google Translate to Spoof Login Page
Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise
According to new Check Point research, cryptojacking attacks, in which malware uses the processing resources of an infected system to mine cryptocurrency, impacted ten times more organizations in 2018 …
Continue Reading about Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise
The Russian Threat – An OODA Network Webinar
OODA Network Members were invited to participate in our webinar on the Russian Threat on Tuesday February 19, 2019. We have made this webinar available on demand for those members unable to join us …
Continue Reading about The Russian Threat – An OODA Network Webinar
Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists
According to the Bulletin of Atomic Scientists, cybersecurity issues are part of the reason why the Doomsday Clock currently stands at two minutes to midnight, which is the same critical position as …