Month: November 2019

0 Comments
Cyber professionals will compete to find leads in real missing persons cases in a competition in Washington, DC, next month.  SANS Institute has teamed up with non-profit organization Trace Labs to host the Open-Source Intelligence (OSINT) Missing Persons Capture the Flag (CTF) in partnership with local, state, and federal law enforcement agencies. Participants, working in teams of
0 Comments
Are you considering a career in cybersecurity? What learning path(s) should you take? Does formal education matter? ESET experts share their insights. With cyberthreats on the rise, cybersecurity professionals are, unsurprisingly, a hot commodity. According to a recent study, there will be 350% growth in open cybersecurity positions from 2013 to 2021 and it is
0 Comments
Freshworks, a company that makes a variety of business software tools, from CRM to help-desk software, announced a $150 million Series H investment today from Sequoia Capital, CapitalG (formerly Google Capital) and Accel on a hefty $3.5 billion valuation. The late-stage startup has raised almost $400 million, according to Crunchbase data. The company has been
0 Comments
America’s Internal Revenue Service is to launch a large-scale cyber-safety campaign to coincide with the busiest shopping period of the year. According to the website Accountingtoday.com, the campaign by the IRS will begin on the Monday after Thanksgiving, commonly known to bargain hunters as Cyber Monday.  “The campaign will emphasize to practitioners and taxpayers the
0 Comments
Security pros know October as National Cybersecurity Awareness Month. But October 2019 marked another important event: It was the fifth anniversary of the release of Docker 1.0. Since Docker was introduced, there has been a tremendous evolution in containers and the containerization ecosystem. Consider, for example, the emergence of container-focused cloud services, the proliferation of
0 Comments
by Danny Bradbury Apple has yanked an app from its iTunes App Store that allowed Instagram users to follow their friends’ activities on the social network. Apple removed Like Patrol from its store last weekend citing a violation of its data collection policies. Apple didn’t return requests for comment, but the app showed up as
0 Comments
The infamous vulnerability has been exploited for a cryptocurrency mining campaign, but more damaging attacks may still be in store Ever since it was discovered six months ago, the BlueKeep vulnerability has had (not only) the cybersecurity community concerned about impending WannaCryptor-style attacks. Earlier in November, Microsoft together with security researchers Kevin Beaumont and Marcus
0 Comments
Complying with cyber regulations forms a significant portion of the CISO’s responsibility. Compliance is, in fact, one of the major drivers in the purchase and implementation of new security products. But regulations come in multiple different colors and shapes – some are tailored to a specific vertical, while others are industry-agnostic. Some bare explicit consequences
0 Comments
PortSwigger has launched a free interactive training platform in an attempt to address the global shortage of cybersecurity talent.  The makers of Burp Suite cut the ribbon on the new Web Security Academy last month following a soft launch of the platform in April 2019, which a PortSwigger spokesperson said had garnered “overwhelmingly positive user feedback.” The Web
0 Comments
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News. With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile
0 Comments
A new report looking at 5G cybersecurity readiness has found that many businesses are inadequately prepared for the latest big data acceleration.  The AT&T Cybersecurity Insights Report: Security at the Speed of 5G, published today, found that enterprises are lagging behind on expanding their virtualization and software-defined networking (SDN) capabilities and are not taking the opportunity to
0 Comments
Mozilla, in partnership with Facebook, Cloudflare, and other IETF community members, has announced technical specifications for a new cryptographic protocol called “Delegated Credentials for TLS.” Delegated Credentials for TLS is a new simplified way to implement “short-lived” certificates without sacrificing the reliability of secure connections. In short, the new TLS protocol extension aims to effectively
0 Comments
Florida’s largest police department is seeking to gain permanent access to a facial recognition network maintained by the Pinellas County Sheriff’s Office. The Face Analysis Comparison and Examination System (FACES), set up in 2001 with federal grant money, is the largest collaborative open-model facial recognition system in the United States. The system uses a MorphoTrust