Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
04-07Forbes

TikTok Loses $6 Billion As Users Told ‘Delete App Immediately’

04-07Forbes

Iran Nuclear Facility Explosion: Accident, Sabotage, Or Cyber-Attack?

04-07Forbes

AI 50: America’s Most Promising Artificial Intelligence Companies

04-07Bleepingcomputer

Try2Cry ransomware tries to worm its way to other Windows systems

04-07Bleepingcomputer

The Week in Ransomware - July 3rd 2020 - Yes, Macs need antivirus

04-07Bleepingcomputer

Avaddon ransomware shows that Excel 4.0 macros are still effective

04-07Infosecurity

NSA Issues VPN Security Guidance

04-07Infosecurity

Moose Remain Unaware of Lottery Privacy Breach

04-07Infosecurity

Avaddon Ransomware Still Using Excel 4.0 Macros

04-07Infosecurity

Record Number Enrol in Online NCSC CyberFirst Courses

04-07Infosecurity

V Shred Exposes Pics and PII on 100,000 Customers

04-07Security Magazine

What’s your BCP plan?

04-07The Hacker News

Police Arrested Hundreds of Criminals After Hacking Into Encrypted Chat Network

04-07Threatpost

E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

04-07Threatpost

Ring Doorbell’s Police Partnerships Questioned Over Racial Bias

03-07Forbes

New Apple Patents Herald The Return Of A Much-Loved iPhone Feature

03-07Infosecurity

GoldenSpy Uninstaller Appears Out of Nowhere

03-07Infosecurity

Global Dating App Users Exposed in Multiple Security Snafus

03-07Forbes

Pirated Security Apps Are Being Used To Spread New Mac Ransomware

03-07Forbes

Police Arrest 746 As Encrypted Message Platform Hack Disrupts Organized Crime In Europe

03-07Forbes

Your Screen Resolution Can Stop Malware: Here’s How That Works

03-07Bleepingcomputer

Microsoft Defender ATP now helps secure network devices

03-07Bleepingcomputer

Surge of MongoDB ransom attacks use GDPR as extortion leverage

03-07Bleepingcomputer

Windows 10 background image tool can be abused to download malware

03-07Bleepingcomputer

Researchers link APT15 hackers to Chinese military company

03-07Bleepingcomputer

Hundreds arrested after encrypted messaging network takeover

03-07Bleepingcomputer

GoldenSpy backdoor installed by tax software gets remotely removed

03-07Help Net Security

How data science delivers value in a post-pandemic world

03-07Help Net Security

Lack of technology skills creates a dent in remote workers’ productivity

03-07Help Net Security

New technique keeps your online photos safe from facial recognition algorithms

03-07Help Net Security

CCPA enforcement to put pressure on financial organizations’ IT resources

03-07Help Net Security

BeyondEdge unveils SD-LAN and Tibit XGS-PON MicroPlug OLT to simplify network architecture

03-07Help Net Security

Ordr SCE 7.2: Enabling orgs to monitor for risks and proactively strengthen infrastructure

03-07Help Net Security

Vulcan Cyber now offers customizable vulnerability prioritization for efficient vulnerability reme

03-07Help Net Security

Kyoto Semiconductor develops photodiode with 400Gbps transmission speed

03-07Help Net Security

Red Hat Enterprise Linux serves as operating system for supercomputers

03-07Help Net Security

Green House Data aligns with Zerto to accelerate digital transformation initiatives

03-07Tweakers

Malwarebytes 4.1.2.73

03-07Infosecurity

Researchers Find Vulnerabilities in Apache Remote Desktop Software

03-07Infosecurity

US Schools and Colleges Have Leaked 24.5 Million Records Since 2005

03-07Infosecurity

Hundreds Arrested After Cops Dismantle Encrypted Phone Network

03-07Infosecurity

Security Analysts Disproportionate in their Investigation of Malware

03-07Infosecurity

New Mac Ransomware Hidden in Pirated Software

03-07Infosecurity

Security Serious Opens Nominations for Fifth Unsung Heroes Awards

03-07Infosecurity

Scam Cryptocurrency Biz Dissolved After Stealing £1.5m

03-07Security Magazine

Post-COVID-19 and Mental Health

03-07Security Magazine

Protecting Industrial IoT Devices

03-07Security Magazine

Back up your cloud data

03-07Security Magazine

4 barriers to teaching employees good cybersecurity habits — and how to overcome them

03-07Security Magazine

University of Utah reorganizes their Department of Public Safety

03-07Security Magazine

Lookout research: mobile APT surveillance campaigns targeting Uyghurs

03-07Threatpost

Trojans, Backdoors and Droppers: The Most-Analyzed Malware

03-07Threatpost

Apache Guacamole Opens Door for Total Control of Remote Footprint

03-07Threatpost

Facebook Privacy Glitch Gave 5K Developers Access to ‘Expired’ Data

03-07Threatpost

FakeSpy Android Malware Spread Via ‘Postal-Service’ Apps

02-07Forbes

Zoom Security: 100 New Features Later, Can You Trust Zoom Yet?

02-07Forbes

Android Users Beware—If You Have Facebook On Your Phone, Look Away Now

02-07Help Net Security

Microsoft fixes two RCE flaws affecting Windows 10 machines

02-07Tweakers

Malwarebytes 4.1.0.56 - 1.0.972

02-07Infosecurity

Facebook Privacy Snafu Exposes User Data to Thousands of Apps

02-07Infosecurity

SonicWall Appoints Tristan Bateup as Country Manager for Ireland

02-07The Hacker News

Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking

02-07Forbes

Experts: COVID Multiplying Risks To Critical Infrastructure

02-07Forbes

Anduril Raises $200 Million To Fund Ambitious Plans To Build A Defense Tech Giant

02-07Forbes

Anonymous Hackers Target TikTok: ‘Delete This Chinese Spyware Now’

02-07Bleepingcomputer

Windows POS malware uses DNS to smuggle stolen credit cards

02-07Bleepingcomputer

US Govt shares tips on defending against cyberattacks via Tor

02-07Bleepingcomputer

Dozens of US news sites hacked in WastedLocker ransomware attacks

02-07Help Net Security

Key cybersecurity industry challenges in the next five years

02-07Help Net Security

Using confidential computing to protect Function-as-a-Service data

02-07Help Net Security

Adopting more tools doesn’t necessarily improve security response efforts

02-07Help Net Security

DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targe

02-07Help Net Security

CIOs are apprehensive about interruptions due to expired machine identities

02-07Help Net Security

40% of security pros say half of cyberattacks bypass their WAF

02-07Help Net Security

Envoy unveils open beta of Envoy Protect designed to safely bring employees back to the workplace

02-07Help Net Security

BehavioSec meets enhanced authentication demands by delivering zero trust safeguards

02-07Help Net Security

Segra’s Remote Office LAN enables in-office, enterprise-grade experience for remote workers

02-07Help Net Security

NETGEAR’s new Orbi Mesh System is designed to deliver whole home WiFi 6 mesh to more households

02-07Nu.nl

Amerikaanse autoriteiten stuiten bij afluisteren steeds vaker op versleuteling

02-07Infosecurity

NTT Data Center Subsidiary Settles with FTC in Privacy Spat

02-07Infosecurity

California's CCPA Gets Teeth Today

02-07Infosecurity

Bitcoin Scammers Use Celebrity Names to Lure Victims

02-07Infosecurity

Remote Workers Becoming More Security Conscious Although Bad Habits Persist

02-07Infosecurity

Entries Now Open for the 2020 Tech Trailblazers Awards

02-07Infosecurity

Malware Uses Postal App Lure to Send SMS Messages and Steal Data

02-07Infosecurity

Nominations Open for the Outstanding Security Performance Awards 2021

02-07Infosecurity

FCC: Huawei and ZTE Are National Security Threat

02-07Security Magazine

Survey finds most COVID-19 patients don't know who infected them

02-07Security Magazine

IBM: security response planning on the rise, but containing attacks remains an issue

02-07Security Magazine

DDoS attacks increase 542% quarter-over-quarter amid pandemic

02-07Security Magazine

CCPA enforcement deadline has arrived - are you prepared?

02-07Security Magazine

72% of remote workers have gained cybersecurity awareness during lockdown

02-07Security Magazine

Why identity and access management is critical to securing a remote workforce

02-07Security Magazine

FBI warns of potential fraud in antibody testing for COVID-19

02-07Security Magazine

(ISC)2 Security Congress 2020 now a virtual conference

02-07Security Magazine

US Senators introduce the Lawful Access to Encrypted Data Act

02-07Security Magazine

SIA adopts new ethics principles

02-07The Hacker News

Microsoft Releases Urgent Windows Update to Patch Two Critical Flaws

02-07The Hacker News

Use This Definitive RFP Template to Effectively Evaluate XDR solutions

02-07Threatpost

Cisco Warns of High-Severity Bug in Small Business Switch Lineup

Onze partners

Ook partner worden?