CDSA News Headlines
How India is Building an Ecosystem Around Cybersecurity (Analytics India)
In light of the burgeoning digital sector in India, ambitious plans for quick transformation and rapid growth, the role of IT infrastructure is critical. At the same time, it needs... More
Weekend Vulnerability and Patch Report, Mar. 8, 2020 (SecureTheVillage)
Important Security Updates Piriform CCleaner: Piriform has released version 5.64.7613 for CCleaner. Updates are available from Piriform’s website. Spotify: Spotify has rele... More
State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)
Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More
Hacking Victims are Uncovering Cyberattacks Faster – and GDPR is the Reason Why (ZDNet)
The amount of time hackers spend inside the networks of compromised organisations before being uncovered has massively declined across Europe -- and GDPR is a key reason for the dr... More
IFPI Forces Closure of Site That Sold ‘Fake’ Plays on Spotify, YouTube (Billboard)
A legal injunction has been placed against one of Europe's leading "fake stream" sites, ordering it to close. The order was filed against Followerschmiede.de in the Berlin District... More
We Need More Than Security Awareness to Combat Insider Threats (SecurityIntelligence)
There are plenty who would say that issues around malware and similar threats are due to people being stubborn, lazy or ignorant of how much damage a security incident can cause. M... More
Warning Over ‘Hidden Apps’ as Mobile Malware Attacks Increase – and Get Sneakier (ZDNet)
Mobile malware attacks are becoming more common as cyber criminals increasingly turn their attention towards smartphones – and they're ensuring that malicious activity is harder ... More
Why Threat Intelligence Gathering Can Be a Legal Minefield (Dark Reading)
In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground on... More
Cisco, Microsoft Team to Control Growing IoT Networks (NW)
Cisco will meld its recently released Intelligent Edge software with Microsoft’s Azure IoT Hub to make transferring data from edge devices to applications in the Azure cloud simp... More
Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)
Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More
AI Gives Web Hosting Industry Crucial Edge Over Cyber Criminals (SDC)
The web hosting industry has undergone a tremendous transformation in recent years. One of the biggest trends is the growing reliance on artificial intelligence. AI has helped web ... More
How Will AI-Generated Deepfake Content Impact Your Business? (Avanade Insight)
The challenge with deepfake technology is that bad actors have an outsized advantage and there are no solid technology solutions in place to address the growing threat. In AI circ... More
Cybersecurity News of the Week, Mar. 1, 2020 (SecureTheVillage)
Important Security Updates Google Chrome: Google has released Version 80.0.3987.122. Updates are available within the browser or from Google’s website. ... More
Making Cloud Security a Team Sport (Security Intelligence)
While most large enterprises are moving to the cloud in some form, the path is never as direct as chief information officers and chief information security officers (CISOs) might l... More
FBI: The Most Perpetrated Cybercrime is Not What You Think (PCMag)
A dive into the reported Cybercrime stats show ransomware and phishing are not as big a threat as extortion, data breaches, and simply not getting what you paid for.... More
Why Azure Sphere From Microsoft is a Big Deal for the IoT Ecosystem (Forbes)
To ensure that security is an integral part of the connected solution, Microsoft has taken the lead in building an end-to-end platform built from the ground up. Branded as Azure Sp... More
You Can’t Automate the Entire Cybersecurity Function – Yet (TechHQ)
Automation is 'not a quick, fix-all solution,' says the Ponemon Institute. Cybersecurity needs humans.... More
Malvertising in Govt, Enterprise Targets Old Software, Macs (BleepingComputer)
A new report on malicious advertising underscores the importance of using modern web browsers and making sure your operating system is up to date with the latest security updates t... More
Do We Have to Trade Convenience for Good Cybersecurity? (TWA)
One of the biggest challenges for companies and enterprises today is information network security or cybersecurity. Today, companies are ceaseless in ensuring their fight against d... More
The Chief Information Security Officer Is Not The Enemy (Digitalist)
CISOs now have a dual role: protecting the organization and its most precious assets (including employee and customer information) but also helping users run secure processes more ... More