CDSA News Headlines

 

How India is Building an Ecosystem Around Cybersecurity (Analytics India)

In light of the burgeoning digital sector in India, ambitious plans for quick transformation and rapid growth, the role of IT infrastructure is critical. At the same time, it needs... More

Weekend Vulnerability and Patch Report, Mar. 8, 2020 (SecureTheVillage)

Important Security Updates Piriform CCleaner: Piriform has released version 5.64.7613 for CCleaner. Updates are available from Piriform’s website. Spotify: Spotify has rele... More

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More

Hacking Victims are Uncovering Cyberattacks Faster – and GDPR is the Reason Why (ZDNet)

The amount of time hackers spend inside the networks of compromised organisations before being uncovered has massively declined across Europe -- and GDPR is a key reason for the dr... More

IFPI Forces Closure of Site That Sold ‘Fake’ Plays on Spotify, YouTube (Billboard)

A legal injunction has been placed against one of Europe's leading "fake stream" sites, ordering it to close. The order was filed against Followerschmiede.de in the Berlin District... More

We Need More Than Security Awareness to Combat Insider Threats (SecurityIntelligence)

There are plenty who would say that issues around malware and similar threats are due to people being stubborn, lazy or ignorant of how much damage a security incident can cause. M... More

Warning Over ‘Hidden Apps’ as Mobile Malware Attacks Increase – and Get Sneakier (ZDNet)

Mobile malware attacks are becoming more common as cyber criminals increasingly turn their attention towards smartphones – and they're ensuring that malicious activity is harder ... More

Why Threat Intelligence Gathering Can Be a Legal Minefield (Dark Reading)

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground on... More

Cisco, Microsoft Team to Control Growing IoT Networks (NW)

Cisco will meld its recently released Intelligent Edge software with Microsoft’s Azure IoT Hub to make transferring data from edge devices to applications in the Azure cloud simp... More

Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)

Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More

AI Gives Web Hosting Industry Crucial Edge Over Cyber Criminals (SDC)

The web hosting industry has undergone a tremendous transformation in recent years. One of the biggest trends is the growing reliance on artificial intelligence. AI has helped web ... More

How Will AI-Generated Deepfake Content Impact Your Business? (Avanade Insight)

The challenge with deepfake technology is that bad actors have an outsized advantage and there are no solid technology solutions in place to address the growing threat. In AI circ... More

Cybersecurity News of the Week, Mar. 1, 2020 (SecureTheVillage)

Important Security Updates Google Chrome: Google has released Version 80.0.3987.122. Updates are available within the browser or from Google’s website. ... More

Making Cloud Security a Team Sport (Security Intelligence)

While most large enterprises are moving to the cloud in some form, the path is never as direct as chief information officers and chief information security officers (CISOs) might l... More

FBI: The Most Perpetrated Cybercrime is Not What You Think (PCMag)

A dive into the reported Cybercrime stats show ransomware and phishing are not as big a threat as extortion, data breaches, and simply not getting what you paid for.... More

Why Azure Sphere From Microsoft is a Big Deal for the IoT Ecosystem (Forbes)

To ensure that security is an integral part of the connected solution, Microsoft has taken the lead in building an end-to-end platform built from the ground up. Branded as Azure Sp... More

You Can’t Automate the Entire Cybersecurity Function – Yet (TechHQ)

Automation is 'not a quick, fix-all solution,' says the Ponemon Institute. Cybersecurity needs humans.... More

Malvertising in Govt, Enterprise Targets Old Software, Macs (BleepingComputer)

A new report on malicious advertising underscores the importance of using modern web browsers and making sure your operating system is up to date with the latest security updates t... More

Do We Have to Trade Convenience for Good Cybersecurity? (TWA)

One of the biggest challenges for companies and enterprises today is information network security or cybersecurity. Today, companies are ceaseless in ensuring their fight against d... More

The Chief Information Security Officer Is Not The Enemy (Digitalist)

CISOs now have a dual role: protecting the organization and its most precious assets (including employee and customer information) but also helping users run secure processes more ... More

Sign up for our newsletters
* indicates required
MESA Newsletters