Fresh cyber security content and webinars

Subscribe for our newsletter to get a weekly digest of most important cyber security news and to stay up-to-date e.g. on latest product development and upcoming webinars from our team.
Kiitos! Klikkaa vielä saamaasi vahvistuslinkkiä (sähköposti otsikolla "Vahvista sähköpostiosoitteesi") ja uutiskirje saapuu jatkossa sähköpostiisi.
Valitettavasti jotain meni pieleen. Voit olla yhteydessä tiimi@tietosuojamalli.fi.

Researchers disclose DLL loading vulnerabilities in Autodesk, Trend Micro, Kaspersky software

15.5.2020
Unpatched Vulnerabilities

Updated: Privilege escalation and code execution bugs lurked in the applications.

Go to article at

Albany Airport pays hackers ransom, regains data from computers

15.5.2020
Ransomware

John Cropley provides an update to earlier reports concerning the ransomware attack Christmas day on Albany International...

Go to article at

FBI Warns of Risks Behind Using Free WiFi While Traveling

15.5.2020
Man-in-the-Middle Attacks

The U.S. Federal Bureau of Investigation recommends travelers to avoid connecting their phone, tablet, or computer to free wireless hotspots while traveling during the holiday season. [...]

Go to article at

Is Universal Directory a Replacement for AD?

15.5.2020
Outdated Access Rights

Whether Universal Directory works for you is ultimately up to your individual requirements, but any AD replacement needs certain capabilities.The post Is Universal Directory a Replacement for AD? appeared first on JumpCloud.The post Is Universal Directory a Replacement for AD? appeared first on Security Boulevard.

Go to article at

New BlueKeep Scanner Lets You Find Vulnerable Windows PCs

15.5.2020
Unpatched Vulnerabilities

A new scanning tool is now available for checking if your computer is vulnerable to the BlueKeep security issue in Windows Remote Desktop Services. [...]

Go to article at

SG: Public healthcare cluster NHG fined $6,000 for not securing personal data

15.5.2020
Illegal Personal Data Processing

Hariz Baharudin reports: Public healthcare cluster National Healthcare Group (NHG) has been fined $6,000 for failing to...

Go to article at

This trojan malware is being used to steal passwords and spread ransomware

15.5.2020
Malware

A newly discovered hacking campaign by a 'sophisticated cyber criminal operation' is targeting healthcare and education organisations with custom-built, Python-based trojan malware which gives attackers almost control of Windows systems with the ability to monitor actions and steal sensitive data. Malicious functions of the remote access trojan , dubbed PyXie RAT, include keylogging, credential harvesting, recording video, cookie theft, the ability to perform man-in-the-middle attacks and the capability to deploy other forms of malware onto infected systems. However, traces of the attacks have been found and detailed by cyber security researchers at Blackberry Cylance, who named the malware PyXie because of the way its compiled code uses a '.pyx' file extension instead of the '.pyc' typically associated with Python. A third stage of the multi-level download sees PyXie RAT leverage something known in the code as 'Cobalt Mode' which connects to a command and control server as well as downloading the final payload.

Go to article at

Companies Need to Rethink What Cybersecurity Leadership Is

15.5.2020
CyberNow

Cyber leaders have the monstrous and all-important goal of securing a business, but when companies make big, strategic decisions — about business models, digital strategy, product mix, M&A — cybersecurity is an afterthought. Today’s cyber leaders must be able to embed security throughout the company’s operations, rapidly respond to threats, and influence fellow senior leaders. Research being run by New America (where I’m a Cybersecurity Policy Fellow), paired with my observations from dozens of consulting engagements, suggests a framework for what business leaders must do to spur cybersecurity success. A global pharmaceutical organization that I’ve worked with incentivizes “better” behavior by tailoring cyber KPIs to each business unit, creating healthy peer pressure that encourages executives to partner with the cybersecurity function, and establishing bonuses for those leaders whose departments do.

Go to article at