Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

Satnam Narang at Tenable notes that CVE-2020-1337 is a patch bypass for CVE-2020-1048 , another Windows Print Spooler vulnerability that was patched in May 2020.

Patch Tuesday, Good Riddance 2020 Edition

Krebs on Security

Microsoft today issued its final batch of security updates for Windows PCs in 2020, ending the year with a relatively light patch load. Security Tools Time to Patch adobe Allan Liska Microsoft Office Microsoft Patch Tuesday December 2020 Microsoft Teams Oskars Vegeris Recorded Future

IT 168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Microsoft Patch Tuesday, October 2020 Edition

Krebs on Security

Time to Patch CVE-2020-16898 CVE-2020-16947 Dustin Childs Flash Player patch Ivanti mcafee Microsoft Patch Tuesday October 2020 Steve Povolny Todd Schell trend micro Zero Day InitiativeIt’s Cybersecurity Awareness Month!

Microsoft Patch Tuesday, Sept. 2020 Edition

Krebs on Security

The last time Flash got a security update was June 2020, which may suggest researchers and/or attackers have stopped looking for flaws in it. Microsoft today released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software.

2020 Database Strategies and Contact Acquisition Survey Report

As buyer expectations continue to heighten, marketing and sales teams are feeling pressured to deliver authentic messaging to buyers at every point of their customer journey. This report aims to highlight the current state of B2B database and contact acquisition strategies, and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

????????”??”???????2020??????

DXC

2020???????????????????????????????????????? 2020?????? DXC??????????????3?????????????????????????????????????????????????????????????????????????????????????????????????????? 3?????????????????????????????????????????????????????????????????????????????????????????????????????? ?????????????????????????????????????????????????????? ???????????????Japan Japan CTO????????????????????????DXC???????????????????????????????????????????IT?????????????????????????????????????????????????????????????

IT 42

Health Data Breaches in 2020: Ransomware Incidents Dominate

Data Breach Today

Blackbaud, Magellan Health Incidents Trigger Numerous Breach Notifications Hacking incidents involving ransomware attacks continue to dominate the 2020 health data breach tally, with incidents affecting two companies - Blackbaud and Magellan Health - accounting for numerous breach notifications by their clients.

Analysis: 2020 Health Data Breach Trends

Data Breach Today

Ransomware, Phishing Incidents, Vendor Hacks Prevail Hacking incidents, including ransomware and phishing attacks, as well as security incidents involving vendors dominated the federal tally of major health data breaches in 2020

Microsoft Patch Tuesday, June 2020 Edition

Krebs on Security

Perhaps most troubling of these ( CVE-2020-1301 ) is a remote code execution bug in SMB capabilities built into Windows 7 and Windows Server 2008 systems — both operating systems that Microsoft stopped supporting with security updates in January 2020. Trend Micro’s Zero Day Initiative June 2020 patch lowdown. Time to Patch CVE-2020-0796 CVE-2020-1225 CVE-2020-1226 CVE-2020-1229 CVE-2020-1301 Microsoft Windows Update June 2020 Tenable

Cryptic Rumblings Ahead of First 2020 Patch Tuesday

Krebs on Security

14, the first Patch Tuesday of 2020. Time to Patch Anne Neuberger CERT Coordination Center CERT-CC crypt32.dll microsoft Microsoft CryptoAPI national security agency nsa Patch Tuesday January 2020 Will Dormann windowsSources tell KrebsOnSecurity that Microsoft Corp. is slated to release a software update on Tuesday to fix an extraordinarily serious security vulnerability in a core cryptographic component present in all versions of Windows.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. But how do you monitor your new program? Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

The Coolest Hacks of 2020

Dark Reading

Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks

IT 102

RSA 2020: The Show Must Go On

Data Breach Today

Coronavirus Will Not Alter Plans for Event in San Francisco While public health concerns over the spread of the coronavirus are leading to the cancellation of some international events, the RSA Conference 2020 will proceed as scheduled in San Francisco Feb.

180
180

2020 Predictions: Targeted Ransomware and 5G Vulnerabilities

Data Breach Today

WatchGuard's Corey Nachreiner on Threat Report's Top 3 Predictions New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions

2020 Was a Secure Election

Schneier on Security

Over at Lawfare: “ 2020 Is An Election Security Success Story (So Far).” ” What’s more, the voting itself was remarkably smooth.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Cybersecurity Plan for 2020 US Election Unveiled

Data Breach Today

Cybersecurity Infrastructure and Security Agency has released its cybersecurity plan for the run-up to the 2020 presidential election, outlining the agency's role as a facilitator that will assist federal, state and local agencies in protecting critical election infrastructure CISA Describes Its Role as Security Facilitator The U.S.

Tianfu Cup 2020 – 5 minutes to hack Windows 10, Ubuntu iOS, VMWare EXSi, and others

Security Affairs

TFC 2020 has come to the end, all these excellent offensive researchers and their burning 0days makes #TFC 2020 a success! pic.twitter.com/MwJLc5M0B4 — TianfuCup (@TianfuCup) November 8, 2020. — TianfuCup (@TianfuCup) November 8, 2020.

Cybersecurity Leadership: '2020 Has Been the Perfect Storm'

Data Breach Today

CEOS and CISOs on the New Challenges to Securing Data With COVID-19 as a backdrop and 5G on the horizon, what will be 2021's top issues in identifying, protecting and defending against attacks across a dramatically expanded threat landscape?

Security Pros Reflect on 2020

Dark Reading

Eight cybersecurity leaders go deep on their most valuable (and very human) takeaways from a year like no other we've known

The ABC’s of Recruiting for Gen Z

Take a look around you at any given moment, and somebody is likely surfing the web on their phone. In 2020, society has fully immersed itself in the web and all it has to offer - and no one more so than those of Generation Z. With “Gen Zers” beginning to enter the workforce at entry-level positions, it’s crucial to understand that this generation operates differently from the last. With this caveat in mind, read on to learn how to adapt your recruiting strategy to appeal to this pool of potential employees.

RSA Conference 2020 Preview

Data Breach Today

"The Human Element" is the theme of the RSA Conference 2020, but there are plenty of technology-rich topics in store for attendees, including session tracks that focus on election security, open source tools, product security and anti-fraud. Britta Glade, a conference director, previews the event

Microsoft December 2020 Patch Tuesday fixes 58 bugs, 9 are critical

Security Affairs

Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code execution vulnerabilities. Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code issues.

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks

Inside Webroot 2020 Threat Report

Data Breach Today

Hal Lonas of OpenText Shares Cybersecurity Predictions Webroot just released its 2020 Threat Report. How has the landscape changed, and what cybersecurity predictions are made for 2020? Hal Lonas of OpenText shares insights and outlines the next round of research into artificial intelligence and machine learning

The Best Data Retention Policy & Template To Get You Started

In this whitepaper from Onna, we will walk you through data retention best practices and provide you with a downloadable template to help you get organized and gain better visibility into your data’s lifecycle.

2020 Likely To Break Records for Breaches

Adam Levin

2020 is on the path to becoming a record-breaking year for data breaches and compromised personal data. billion records have already been exposed, and that’s only accounting for the first quarter of 2020. While the number of publicly reported breaches in Q1 2020 decreased by 58% compared to 2019, the coronavirus pandemic gave cybercriminals new ways to thrive,” wrote Bitdefender researcher and blogger Alina Bizga.

The Best of RSA Conference 2020

Data Breach Today

A Guide to Video Interviews With Thought Leaders at This Year's Event At RSA Conference 2020 in San Francisco, Information Security Media Group's editorial team conducted more than 130 video interviews with industry thought leaders. Here are the highlights

Compliance Lessons From 2020 Fraud Cases

Data Breach Today

Panel of Experts Discusses How Technology Can Mitigate Large-Scale Global Fraud What compliance lessons can be learned from major fraud cases in 2020, including the Goldman Sachs bribery case, the Wirecard mass corruption case and the Novartis bribery case?

Reading the 2020 Cost of a Data Breach Report

Security Affairs

2020 Cost of a Data Breach Report: the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5% According to the 2020 Cost of a Data Breach Report , the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5%

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Rocket.Build 2020: Leading Innovation

Rocket Software

With Rocket.Build 2020 being a virtual event for the first time in its history, it does offer some unique challenges. The post Rocket.Build 2020: Leading Innovation appeared first on The Rocket Software Blog. There’s a feeling of code in the air.

Microsoft Patch Tuesday, May 2020 Edition

Krebs on Security

BleepingComputer on May 2020 Patch Tuesday. Microsoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed prior to today, but as always if you’re running Windows on any of your machines it’s time once again to prepare to get your patches on.

Risk 146

The 5 Most-Wanted Threatpost Stories of 2020

Threatpost

A look back at what was hot with readers -- offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year.

Patch Tuesday, January 2020 Edition

Krebs on Security

Microsoft today released updates to plug 50 security holes in various flavors of Windows and related software. The patch batch includes a fix for a flaw in Windows 10 and server equivalents of this operating system that prompted an unprecedented public warning from the U.S. National Security Agency. This month also marks the end of mainstream support for Windows 7 , a still broadly-used operating system that will no longer be supplied with security updates.

The 2020 Data Intelligence Glossary for Recruiting and HR Professionals

As a recruiter, your goal is to place the right candidates at the right jobs or into ideal accounts. In today’s competitive marketplace, doing so is harder than ever. To build a candidate pipeline and keep the talent flowing into your agencies and organizations, it’s important to understand data-driven recruiting concepts to stay ahead of competitors.

Microsoft Patch Tuesday, April 2020 Edition

Krebs on Security

Further reading: Qualys breakdown on April 2020 Patch Tuesday. Microsoft today released updates to fix 113 security vulnerabilities in its various Windows operating systems and related software. Those include at least three flaws that are actively being exploited, as well as two others which were publicly detailed prior to today, potentially giving attackers a head start in figuring out how to exploit the bugs.

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

Threatpost

Malware Most Recent ThreatLists Web Security Cisco cobalt strike credential dumping detection evasion dual-use tools endpoint security fileless malware first half 2020 Mimikatz MITRE ATT&CK persistence ransomware

IT 111

Analysis: 'Orwellian' Surveillance in 2020

Data Breach Today

The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices

IoT 107

Analysis: 'Orwellian' Suveillance in 2020

Data Breach Today

The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices

IoT 107

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.