Trending Articles

Does Your Domain Have a Registry Lock?

Krebs on Security

If you’re running a business online, few things can be as disruptive or destructive to your brand as someone stealing your company’s domain name and doing whatever they wish with it.

Hackers Target European Energy Firm: Researchers

Data Breach Today

Report Says Group Tied to Iran Could Be Involved Hackers who may have ties to Iran have recently turned their attention to the European energy sector, using open source tools to target one firm's network as part of an cyberespionage operation, according to the security firm Recorded Future

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

The Last Watchdog

Cyberattacks are becoming more prevalent, and their effects are becoming more disastrous. To help mitigate the risk of financial losses, more companies are turning to cyber insurance. Related: Bots attack business logic Cyber insurance, like other forms of business insurance, is a way for companies to transfer some of numerous potential liability hits associated specifically with IT infrastructure and IT activities.

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

Security Affairs

The Indonesian National Police and the Interpol announced the arrest of three Indonesian hackers who carried out Magecart attacks.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November.

More Trending

Vulnerabilities Found in Some GE Healthcare Devices

Data Breach Today

Regulators Issue Alerts; Patches on the Way Federal regulators are warning healthcare providers about six vulnerabilities in some of GE Healthcare's medical device systems that could allow attackers to remotely take control of the gear. The company is working on patches


The Doomsday Clock Moves Closer Than Ever to Midnight

WIRED Threat Level

Since the advent of the clock—even during the peak years of the Cold War—the minute hand has never advanced past the 11:58 mark. Security Security / Security News

City of Potsdam offline following a cyberattack

Security Affairs

The City of Potsdam suffered a major cyberattack that took down its servers earlier this week, but emergency services were not impacted.

Technical Report of the Bezos Phone Hack

Schneier on Security

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

DDoS Mitigation Firm Founder Admits to DDoS

Krebs on Security

A Georgia man who co-founded a service designed to protect companies from crippling distributed denial-of-service (DDoS) attacks has pleaded to paying a DDoS-for-hire service to launch attacks against others. Tucker Preston , 22, of Macon, Ga.,

Emotet Malware Alert Sounded by US Cybersecurity Agency

Data Breach Today

Must-Have Defenses Include Detecting Infections and Lateral Movement, CISA Says Emotet malware alert: The U.S.

Kids and Code: Object Oriented Programming with Code Combat

Troy Hunt

Geez time flies. It's just a tad under 4 years ago that I wrote about teaching kids to code with which is an amazing resource for young ones to start learning programming basics.

IT 96

US-based children’s clothing maker Hanna Andersson discloses a data breach

Security Affairs

The US-based children’s clothing maker Hanna Andersson has disclosed a data breach that affected its customers. The US-based children’s clothing maker and online retailer Hanna Andersson discloses a data breach, attackers planted an e-skimmer on its e-commerce platform.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Friday Squid Blogging: More on the Giant Squid's DNA

Schneier on Security

Following on from last week's post , here's more information on sequencing the DNA of the giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

HSMs: Facilitating Key Management in a Hybrid Cloud Environment

Thales eSecurity

Organizations are actively working to prevent data breaches by encrypting their sensitive information. Encryption isn’t a foolproof security measure, however.

ROT 83

POS Vendor for Cannabis Dispensaries Exposed Data: Report

Data Breach Today

Researchers Discovered Unsecured Database Accessible Via Internet A point-of-sale system vendor that serves U.S.

Sales 176

Weekly Update 175

Troy Hunt

Alright, let me get this off my chest first - I've totally lost it with these bloody Instamics. I've had heaps of dramas in the past with recordings being lost and the first time I do a 3-person weekly update only 2 of them recorded (mine being the exception).

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Malware attack took down 600 computers at Volusia County Public Library

Security Affairs

System supporting libraries in Volusia County were hit by a cyber attack, the incident took down 600 computers at Volusia County Public Library (VCPL) branches.

Everything We Know About the Jeff Bezos Phone Hack

WIRED Threat Level

A UN report links the attack on Jeff Bezos' iPhone X directly to Saudi Arabian Crown Prince Mohammed bin Salman. Security Security / Cyberattacks and Hacks

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings


The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting. Vulnerabilities Web Security Cisco cisco flaw Cisco patch Cisco video conferencing vulnerability conference meeting high severity flaw patch video conferencing Webex WebEx flaw

BT and Vodafone Reportedly Want Huawei 5G Gear

Data Breach Today


Top 5 Life Sciences predictions in 2020

OpenText Information Management

With the patient taking center stage, digitization is gaining pace within Life Sciences. This blog looks at how digital technology is going to shape every stage of the drug lifecycle for life science and pharma companies in 2020.

NIST releases version 1.0 of the Privacy Framework

Security Affairs

The NIST released version 1.0 of Privacy Framework, it is a tool designed to help organizations to manage privacy risks. The National Institute of Standards and Technology (NIST) has published the release version 1.0 of its privacy framework.

Risk 95

The Sneaky Simple Malware That Hits Millions of Macs

WIRED Threat Level

How the Shlayer Trojan topped the macOS malware charts—despite its “rather ordinary” methods. Security Security / Cyberattacks and Hacks

IT 68

Fake Smart Factory Honeypot Highlights New Attack Threats


The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems. Critical Infrastructure IoT Malware Web Security Cryptomining Malware CrySis ransomware cyber attack hack honeypot ICS industrial control system malware Phobos ransomware

FBI Warns: Beware of Spoofed Job Application Portals

Data Breach Today


Relieving the Burden of Tax Reporting

Perficient Data & Analytics

Provisioning for income tax can be a complex process for large multi-national organizations to mid-sized companies with a consistent growth mode. The tax provisioning process involves determining the current tax amounts as well as calculating the deferred roll-forward amount.

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate information. Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data.

Scraping the Web Is a Powerful Tool. Clearview AI Abused It

WIRED Threat Level

The facial recognition startup claims it collected billions of photos from sites like Facebook and Twitter. What does the practice mean for the open web? Security Security / Privacy

IT 66

ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates


Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket. Malware Most Recent ThreatLists Email Phishing malware msp pay the ransom ransom ransomware ransomware as a service Remote Desktop Protocol ryuk Sodinokibi