(ISC)² delivered recommendations to White House urging prioritization on development of workforce for the final version of the cybersecurity executive order The nonprofit organization (ISC)² has issued a recommendation calling President Trump to develop workforce as a priority when he issued the final version of the cybersecurity executive order. The main goal is to tackle […]
Webroot home and business products are tagging Windows files and Facebook as malicious after a recent faulty update. Users are going crazy. The Webroot home and business defense solutions started tagging legitimate Windows and Facebook as malicious after a recent update. Many organizations claimed hundreds and even thousands of malfunctions to their endpoints, the glitch caused […]
The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of zero-day threats The NIST CyberSecurity Framework is a guide for businesses and enterprises of good practices for information security. The NIST CyberSecurity Framework proposes a guide, which can adapt to each enterprise e for different […]
It started quietly as a probability not a reality. Now within months cyberwarfare has become a reality plausible as the air we breathe. The revelation of governments hacking units has brought light for a new domain of conflict: Cyberwarfare. Once a secret these government agencies were public revealed like the Equation Group as well as […]
[By Cesare Burei, Margas on courtesy of @CLUSIT – Rapporto Clusit 2017 – All right reserved] Until the corporate Risk Managers dealing with Cyber Risk, and there are not many of these, start working at all levels, who shall be entrusted with the management of Cyber Risks and, more specifically, with the transfer of risk […]
Japan plan to develop a hack proof satellite system to protect transmissions between satellites and ground stations with a dynamic encryption of data. Japan’s Internal Affairs and Communications Ministry plans to develop a communications system to protect satellites from cyber attacks. The hack proof satellite system will protect transmissions between satellites and ground stations implementing […]
The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a regular basis. The Russian APT group known as Turla (also known as Waterbug, KRYPTON and Venomous Bear) has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a regular basis. Carbon is a […]
The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) warns the companies in the healthcare industry of FTP attacks. The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) warns the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers of medical and dental facilities that allow anonymous […]
British interior minister Amber Rudd believes encryption implemented by messaging services is offering a dangerous opportunity for terrorists to communicate. British interior minister Amber Rudd has a clear opinion on encryption implemented by many messaging services, it is no more acceptable. On Sunday the minister Amber Rudd reaffirmed that technology firms must collaborate with law enforcement agencies […]
Adobe patches vulnerabilities in Flash Player and Shockwave for Windows, Mac, Linux and Chrome OS. Adobe issued security updates for Flash Player and Shockwave Player products. The security updates released by the company on Tuesday address seven vulnerabilities in Flash Player and one flaw in Shockwave Player. The Flash Player 25.0.0.127 version fixes critical security vulnerabilities that […]