National Cyber Warfare Foundation (NCWF) Education cybersecurity industry news, cyber warfare, collaboration, chat, forums, threat intellignce, known hacking entities, CVEs, ncwf en-us BEST PRACTICES 9 must-do security protocols companies must embrace to stem remote work risks Commit Strips’ ‘Call The Police’ Security News in Review: Ryuk Ransomware Develops Self-Replication Capabilities [Heads Up] The Chinese Have Likely Hacked Your Exchange Email Server New Tor-Based Gafgyt Variant Discovered Attacking IoT And D-Link Robots that feel by seeing Many clients, many security needs: How one MSSP rose to the challenge Millions of travelers of several airlines impacted by SITA data breach Think Your Cyber Insurance is Going to Cover that $6 Million in Cyber Fraud? Think Again. Phishing Scammers Send a Fake Private Shared Document as the Initial Attack Vector for Stealing LinkedIn Credentials Vendor Email Compromise is Officially A Big (Seven-Figure) Problem XKCD ‘Manage Your Preferences’ Money for nothing: Making sense of data collaborations in healthcare John McAfee Indicted for ICO Manipulation, Securities Fraud Attivo Networks Launches ADAssessor for Continuous Visibility to Active Directory Security Exposures Detecting Privilege Escalation BSides Calgary 2020 – Nigel Weber’s ‘Stay Classy – Class Object Model’ Myanmar Democracy Under Fire: Military Coup Commands International Attention Why I Joined Menlo Security Someone Hacked The Four Top Russian Cybercrime Forums In One Month KnowBe4 Fresh Content Updates from February: Including New Season 3 of 'The Inside Man' Now Available Reblaze Rolls Out Managed Reverse Proxy Security Service China Hacks Microsoft And The US s CISA Issues Warning After Virginia data protection bill signed into law BrandPost: How to Cope with Disruptive Shifts in Cyberattacks What is Encryption Key Management and KMS Implementation? [ALERT] New Stanford Research: 88% Of Data Breaches Are Caused By Human Error The Case for Collective Defense of the Public Sector BlackGirlsHack founder: ‘I’m trying to change what the next generation of cybersecurity looks like’ Collective Defense for the insurance sector If you want to succeed in gaming, don t play games with security Joy Of Tech ‘Google Goes All Pro-Privacy!’ 1930s Air Force Against Fascism: First Women Pilots in Africa Okta Acquisition of Auth0 Signals DevSecOps Shift Left Experts Discuss How to Achieve Greater Gender Equality in the Tech Industry CISO Stories Podcast: and Other Useless Security Constructs CONTRAST LABS REVEALS DEPENDENCY CONFUSION VULNERABILITY IN MICROSOFT TEAMS The March IronNet Threat Intelligence Brief Call for keynote speakers at the first Reddit Robotics Showcase (RRS2021) HIPAA Security Requirements: What They Really Mean A Close Call Prompts Security Reassessment MalwareTech, WannaCry and Kronos Understanding the Connections Smashing Security podcast #217: Would you cuddle this revolting robot? – with Robert Llewellyn Spear Phishing: How It Happens & Why You May Be at Risk Matt Kelly’s ‘Radical Compliance – The Risk Assessment’ BrandPost: Spanish Pharmaceutical Company Drives Digital Innovation with Fortinet 5 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently BrandPost: 4 Strategies for Improving Visibility into Your Cloud Data Breaking Down SOC 2 and ISO 27001: Is One Really Better? US Cybersecurity Firm Opens New Belfast Office Will Your Insurance Policies Step in After a Cyber-Attack? Why Less Can Be More When It Comes to Cybersecurity BrandPost: What s the State of Hybrid and Cloud Security Tools? BrandPost: Origin Story Part 2: A Forensic Examination of SUNBURST After Detection Receive the latest trending threat insights delivered to your inbox with Recorded Future’s free Cyber Daily newsletter. Sign up now! How WAFs Can Mitigate The OWASP Top 10 Gootkit malware creators expand their distribution platform The Security Wisdom of the All-Knowing CISO Tripwire Patch Priority Index for February 2021 X-Rays Defeat LetterLocking: Secrets Exposed of Ancient Folded Papers What is a Smart Card? Google fixes Critical Remote Code Execution issue in Android System component BrandPost: 5 Threat Hunting Techniques to Proactively Improve Your Security Posture America s Intellectual Inequality Undermines STEM CyberheistNews Vol 11 #09 [Heads Up] New Ryuk Ransomware Strain Now Worms Itself To All Your Windows LAN Devices Kaspersky to Co-Chair Working Group of the Paris Call By Their Poor Idiomatic Control Shall Ye Know Them Hacking Multifactor Authentication: An IT Pro s Lessons Learned After Testing 150 MFA Products ManageEngine makes the cut again for unified endpoint management CISO job search: What to look (and look out) for Dependency confusion explained: Another risk when using open-source repositories Researchers introduce a new generation of tiny, agile drones Distributor of Asian food JFC International hit by Ransomware Cybersecurity Challenges: Understanding the What, How and When of Change Cloud-Based Storage Misconfigurations Understanding the Security Risks and Responses Twitter Removes Russian Disinformation Accounts Newly Identified Dependency Confusion Packages Target Amazon, Zillow, and Slack; Go Beyond Just Bug Bounties TalkingTrust with Thales: IoT Security with Keyfactor Tom Cruise is a Fake. For Real This Time. Take the #ChooseToChallenge pledge for International Women s Day Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today! Many Businesses Have GRC Software, Yet Most Still Struggle to Manage IT Risks Consistently CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own New York State Education Department Warns of Phishing Campaign Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks [Heads Up] New Ryuk Ransomware Strain Now Worms Itself To All Your Windows LAN Devices New Ryuk Trojan Now Propagates Itself Within Windows Domain Rapid robotics for operator safety: what a bottle picker can do We are living in 1984 (ETERNALBLUE) Fixing the Human Error Problem China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’ Top 100 Cybersecurity Universities Digital Innovation Hubs: 1.5 billion network to support green and digital transformation starts to take shape XKCD ‘Post-Pandemic Hat’ New scary good deepfake videos of Tom Cruise show the threat to society is very real Five worthy reads: Are we ready for a passwordless future? CPAC 2021 Open Display of Nazi Symbols Ukrainian Authorities Targeted In Russian Supply Chain Malware Attack New data could help CISOs quantify the value of a strong security culture Sete pr ticas de seguran a cibern tica que toda organiza o deveria implementar Um dia na vida de um analista SOC Google to Underwrite Contributors to Linux Security Black History Month Spotlight: Jane-Glenna Anthony XKCD ‘Exposure Models’ AppSec Decoded: What is driving DevSecOps adoption? Data Breach: Turkish legal advising company exposed over 15,000 clients Security operations center, Part 2: Life of a SOC analyst Self-supervised policy adaptation during deployment David Birch Appointed Honorary President of EEMA TikTok agrees to pay $92 million to settle teen privacy class-action lawsuit Integrated Risk Management for Your Business Por qu las VPN en dispositivos m viles son cruciales de proteger el acceso a los datos corporativos? Joy Of Tech ‘Talking Parachute’ Researchers Reveal Four New Groups Hacking Industrial Organizations Data From Bombardier Breached And Posted On The Dark Web Does Sunburst Have Your Confidential Emails and Database Data? Announcing the First-Ever Veracode Hacker Games BrandPost: Configuration Security for Remote Endpoints with CIS-CAT Pro BrandPost: How to Scan Remote Endpoints From Wherever You Are Comforte AG and bizcon AG Join Forces to Deliver Data-centric Security CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights Digital Threat Actors: Organized Criminals Educational Adaptation Required to Close the Cyber-Skills Gap Recorded Future’s free Cyber Daily newsletter brings trending threat insights straight to your inbox Challenges and Misconceptions of Certificate Revocation in PKI Phishing Targets Industrial Control Systems Nominet Announces Expansion of Initiative to Educate Online Users on Cybercrime 10 Database Security Best Practices You Should Know Insider Cloud Data Theft Plagues Healthcare Sector Manslaughter By Car: At Best Negligent in South Dakota Security job candidate background checks: What you can and can't do Facebook Takes Out Myanmar Military After Bloody Coup The Traditional SOC Is Dead, Long Live the Remote SOC A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism John Clossner’s FCW Security Comic BrandPost: 2021 Cybersecurity Trends to Prepare For #329: Robots-as-a-Service, with Afshin Doust LD_PRELOAD: How to Run Code at Load Time Analysis of an attack on automotive keyless entry systems Former Power Company Boss to Admit Wire Fraud Using Insurance Data to Better Tackle Ransomware Sysdig Donates Module to CNCF to Improve Linux Security LevelUP, SecZetta, and RiskRecon Announce New Total TPRMTM Offering in Third-Party Risk Management Bogus FedEx and DHL Phishbait IT Security Firm Kaseya Acquires SOC Platform RocketCyber Streamline project management with advanced analytics for Jira Software Data protection companies Arcserve and StorageCraft to merge Inrupt offers a standard for controlling data and identity on the web Black History Month: Diversity in Cybersecurity Is More Important than Technology De lealtad al enfoque CVEx: as evoluciona la atenci n al cliente BrandPost: What It Takes to Implement Zero Trust With Employees Working From Home The Give and Take of Cake Robots4Humanity in our next Society, Robots and Us conversation Twitter removes 100 accounts linked to Russia disseminating disinformation comforte Named Overall Leader in KuppingerCole Leadership Compass 2021 Aston Martin Partners with SentinelOne Is cloud security keeping pace with digital transformation? How to cyber security: Containerizing fuzzing targets XKCD ‘Mars Landing Video’ Ebbs and Flows Of DevOps Debugging PART 2 Case Study: SCM Insurance Services Finds True Partnership Cybereason Cybereason Accelerates North American Expansion with Strategic Hires How cyberattacks can threaten colleges and universities Organizations at growing risk from initial access brokers a fast growing class of cybercriminal who breach firms and then charge others to do the BrandPost: 5 Often-Overlooked Log Sources BrandPost: Measuring HP Sure Click Enterprise s Return on Investment Hackers Subvert Google Alert Service to Spread Malware Conducting a Virtual SKO in a Physical World THE GDPR Nearly Three Years On, 5 Things You Need to Know 5 ways to combat audit fatigue 10 things work-from-home employees can do now to help protect the network Black History Month Spotlight: Teneil Taylor Placing 2021 Bets on Zero Trust Identity & BehavioSec Would You Call Amazon The Jungle ? GrammaTech Congratulates Long Time Customer, Jet Propulsion Laboratory, on their Successful Landing of Perseverance Rover How can we prevent sophisticated document fraud in 2021? Think Macs Don t Get Malware? Think Again. Silver Marrow Malware Found In Over 30,000 Macs Windows network monitoring made easy with OpManager Undervalued and ineffective: Why security training programs still fall short The big debate: control compliance vs. risk management Industrial Cybersecurity and the Florida Water Supply Attack with Dale Peterson Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021? Top 100 Cybersecurity Breaches Top 100 Cybersecurity Hackers How To Secure Distance Learning Information In The Hacking Prone Environment - The Tech Edvocate Three Microsoft s Source Codes Affected By SolarWinds Hackers Robot Detained a Google AI Ethicist, Terminated Her Windows Defender Is an Underutilized Endpoint Security Resource Getting Into the Rhythm of Chart Typography with {ragg} and {hrbragg} (a.k.a. It s {ragg}-time} Ransomware is Evolving Agencies Must Prioritize Data Backup Top 100 Managed Security Service Providers (MSSPs) Old Dog with New Tricks? Cerber Ransomware Makes a Comeback Targeting Healthcare Kia Motors America: Ransomware Not Behind Extended Systems Outage New Malware Tailored for Apple s M1 Processor Has Been Discovered Capital Group Appoints Marta Zarraga as Global Chief Information Officer Beyond the Security Stack: One Solution for Maximum ROI KnowBe4 Named a January 2021 Gartner Peer Insights Customers Choice for Security Awareness Computer-Based Training Across Three Categories BrandPost: Prioritize Your Security Automation Tasks in 4 Steps The DOJ Charged Two Alleged Members of North Korea s Military Intelligence Services With a Scheme That Included Attempts to Steal $1.3 Billion Over How Cyber Safety Artificial Intelligence Helps Students In K-12 Technology Does Your Domain Have an Evil Twin? Find Out for a Chance to Win! Introducing Eliza Kosoy; E-liza Dolls Vulnerability in SHAREit Leaves Users Exposed To Malware Attack Top 100 Cybersecurity Movies Channeling as A Challenge Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 2 Global Law Firm Attributes Data Breach to Compromise at File Sharing Provider Applied Insight Acquires Maryland Cyber Firm Wake on LAN com gerenciador de endere o IP: uma abordagem hol stica para inicializa o remota Centreon Says All Its Customers Are Safe After Russian Hacking Incidence Caren Havelock Joins SureCloud as New CMO YouTube Terminates 3000 Channels in Russia and China Clampdown Overcoming IoT Asset Management Challenges Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence #328: Inside Cybathlon, with Anni Kern Don t let AppSec tool overload slow down your development Microsoft: SolarWinds attack took more than 1,000 engineers to create Phishing and Impersonated Brands Get trending threat insights delivered to your inbox with Recorded Future’s free Cyber Daily newsletter Top 100 Cybersecurity Books Top 100 Cybersecurity News Sites GUEST ESSAY: Now more than ever, companies need to proactively promote family Online Safety Vulnerability Patching: Why Does It Fall Short So Often? MSSP Visionary Takes Bold Step into the Future The Cybereason Difference: Why PenTesters Don t Want to be Our Valentine 10 Reasons Check-the-Box Compliance Puts Your Organization at Risk Why Threat Actors Continue to Rely on Cyber Fraud Binghamton University implements tighter security measures following cyberattack Threat Alert: Zoom Impersonated for Phishing Attacks How ransomware negotiations work 1980 Datsun Electric Car (Lektrikar II) For Sale Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise? Data Risk, Intelligence and Insider Threats XKCD ‘Normal Conversation’ CommitStrip ‘A Theory About PHP’ CISO Stories Podcast: Telling Scary Stories to the Board? Stop. Here s Why Dutch Intelligence Agencies Warn About Chinese and Russian Cyber Espionage How does ManageEngine comply with the UK data protection laws post Brexit? Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1 Gong Xi Fa Cai! When Organizations Take a Risk-First Approach to IT Compliance, They re Better at Avoiding Security Incidents Egregor Ransomware Adopting New Techniques What it is IP Spoofing, How to Protect Against It – Keyfactor Number Of Cyberattacks On Healthcare Almost Tripled In H2 2020 Cyber Criminal Attempted to Poison Water Supply in Florida Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps What’s most interesting about the Florida water system hack? That we heard about it at all.