Monday 12/3
McAfee Labs 2019 Threats Predictions Report
We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before.
http://bit.ly/2SpPuSs
Pharmaceutical Companies Most Targeted Industry by Cybercriminals
According to Proofpoint researchers, who analyzed attacks against Fortune 500 companies, pharmaceutical companies were the most targeted by hackers in the last quarter with an average of 71 fraud attacks per business. In fact, there have been 282 attacks on the pharma industry this year.
http://bit.ly/2DYldpC
What’s the best way to make the most of the cloud?
As well as scalability and flexibility, Howe says the cloud provides other benefits. "It allows us to be more dynamic as a team and to think more carefully about where we should focus our attention," he says. "It gives us better transparency in terms of costs, too."
https://zd.net/2DYZ1M1
Tuesday 12/4
100 Million Quora Users Affected By ‘Malicious’ Data Breach
The popular question-and-answer website said Monday that a "malicious third party" may have lifted the account information of some 100 million users.
https://n.pr/2QvSzTC
Credit card stealing malware on Canada’s 1-800-FLOWERS website went undetected for four years
The company said it believes the malware was scraping credit cards between August 15, 2014 to September 15, 2018, but that the company’s main 1-800-FLOWERS.com website was unaffected.
https://tcrn.ch/2EdGSvc
How Malware Can Easily Defeat Apple’s macOS Security
With the release of macOS Mojave this year, Apple once again introduced new security features in response to the evolving threatscape facing the platform, restricting Apple Events and hardening user data protections.
http://bit.ly/2rj7j9Z
Re-Energized Cisco Security Strategy Wins Praise From Fast-Growing Partners
Partners say they're experiencing dramatic growth with a significantly revitalized, comprehensive Cisco security portfolio as the San Jose, Calif., company shifts toward a software-, automation- and subscription-focused strategy based on open, programmable systems with security throughout.
http://bit.ly/2BOHJ2K
Wednesday 12/5
NSA tools are still letting hackers take over unpatched systems
Hackers are now using a pair of exploits developed by the NSA to burrow through the router and attack connected systems. The two exploits, known as EternalBlue and EternalRed, target Windows and Linux-based systems respectively. This new attack is being termed “EternalSilence” by Akamai, which warns that with 45,000 infected devices, more than a million connected computers could also be vulnerable.
http://bit.ly/2AY1Vxs
415,000 routers worldwide reportedly infected with cryptojacking malware
The number of affected routers has more than doubled since the malware was initially discovered in August. At the time, it was reported that around 200,000 routers were affected.
http://bit.ly/2Qg78es
Microsoft is building its own Chrome browser to replace Edge
While the modern look and feel has paid off for Edge, the underlying browser engine (EdgeHTML) has struggled to keep up with Chromium. Microsoft is finally giving up and moving its default Windows 10 browser to Chromium.
http://bit.ly/2Qg42qY
Nutanix and Intel Partner to Enable System Integrators and Value-Added Resellers to deliver Branded Hyperconverged Infrastructure Solutions
As part of this technology partnership, VARs and SIs who are Authorized Nutanix Channel Partners, will now be able to brand and personalize Intel Data Center Blocks, packaging them with Nutanix software for individual customer deployments.
http://bit.ly/2St5uD1
Thursday 12/6
Symantec develops neural network to thwart cyberattack-induced blackouts
The Industrial Control System Protection (ICSP) Neural is a device that scans for malware on USB devices to block attacks on IoT and operational technology environments.
https://zd.net/2rl97iU
STEALTHbits Technologies Extends Cloud Data Access Governance Capabilities with Latest Release of StealthAUDIT
In addition to extending Sensitive Data Discovery capabilities and platform support for performing Data Classification in this release, STEALTHbits has also included 51 new GDPR-specific pattern definitions, spanning all EU countries and more.
http://bit.ly/2AWwNyB