This post arrives later than usual, but as they say, "Better late than never." Researchers and the media have highlighted various unique, interesting, or destructive vulnerabilities in the last few weeks. We decided to pick three of these vulnerabilities and talk about them. One was patched with Microsoft's Patch Tuesday in March; another affects the privacy of almost everyone, … [Read more...]
Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
It's Monday, and there's no better way to start a new week than with some cybersecurity-related news. So, if you need an excuse to procrastinate a bit more, allow us to fill that void. For this iteration, we made a few minor improvements, as always. In addition to the table of contents from last time, we've added more granularity by categorizing all the stories by type. For … [Read more...]
Vaporworms – The Top Threat of 2019?
Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. Just a few short months ago, the WatchGuard Threat Lab predicted that 2019 would be the year we’d see a new breed of fileless malware with … [Read more...]
Fansmitter Hacks Air Gaps – Daily Security Byte EP. 281
Back-channel attacks, where attackers send information using unusual and hard to spot communication channels, are not new. However, I think they're cool, if not a bit impractical. In this video, I cover the Fansmitter research from an Israeli University's Cyber Security team. I don't think this type of attack will affect you any time soon, but it's still a fascinating … [Read more...]
Cyber Criminals Get Sophisticated – Daily Security Byte EP. 254
Last week, Marc Laliberte talked about the total lack of network security that led to an $81 million dollar cyber bank heist. In today's video, I share new information about the malware used in the heist, and how it affects the threat landscape. Watch to learn more below. (Episode Runtime: 4:38) Direct YouTube Link: https://www.youtube.com/watch?v=TFbETWfF5bg EPISODE … [Read more...]