Infosecurity News
#ISC2Congress: NOLA a Model of Resiliency for Cyber
(ISC)2 CEO and LA Congressman Richmond talk about the future of cybersecurity.
#ISC2Congress: Humans Are No. 1 Attack Target
Acting deputy CISO for Missouri talks about awareness training programs that work.
US and UK Governments Back Denial of Supermicro Story
Chinese supply chain compromise claims wide of the mark
Investigation Uncovers 300+ Possible GRU Officers
Car ownership database listed names registered to military unit 26165
Experts: California's IoT Security Law Falls Short
Legislation will ban factory default passwords on devices
Credential-Phishing Attempts Highest on Tuesdays
OneDrive, LinkedIn and Office 365 logins are the most popular phishing lures, says Menlo Security.
Fake News Domains Spoof UK News Sites
Typo-squatting found on nearly 200 domains
Fin7 Hackers Breached US Chain Burgerville
Fast food restaurant customers were exposed for a year
GRU Officers Allegedly Hacked Wi-Fi Networks Worldwide
Plan B meant physically travelling to targets, claims US indictment
12.5m Business Email Accounts Accessible via Web
Business email compromise getting easier for criminals, says Digital Shadows.
150 Bugs Found in the Hack the Marine Corps Challenge
The DOD's sixth bug bounty program with HackerOne paid out more than $150K in bounties.
DevOps Producing More Insecure Apps Than Ever
A WhiteHat Security report finds that businesses are not building security into app development lifecycle.
Did Chinese Spies Really Put a Chip in It?
Companies in question dispute Bloomberg's story of China infiltrating supply chain.
DHS Moves to Defend Infrastructure Across Sectors
DHS announces a pipeline cybersecurity initiative and awards $200K to Morphisec to protect financial infrastructure.
#IPEXPO: Follow Motoring's Example on Safety, as Cyber is Failing
Advancements in the motoring industry need to be replicated in cybersecurity to provide a safer online future
Security Serious' Unsung Heroes Awards Winners Announced
The ‘Unsung Heroes’ of cybersecurity were acknowledged at an awards event in London last night
Researchers Call for a Shared Dark Web Taxonomy
Terbium Labs argues that current reports on pricing are inconsistent and misleading
Introducing APT38: North Korea’s Cyber Heist Outfit
Group is responsible for raids against financial institutions, says FireEye
NCSC: Russia’s GRU to Blame for DNC and Other Attacks
UK government goes on the offensive with overt attribution
18 Vulnerabilities Found in Foxit PDF Reader
A free PDF reader is laden with vulnerabilities, says Cisco Talos.