CISO Express | A Security Professional’s Home Page

Latest Security News

Credit Card Breach

Data Breach

Cyber Security

The Hackers News

  • U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies

    U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies

    The US Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) charged Huawei with racketeering and conspiring to steal trade secrets from six US firms, in a significant escalation of a lawsuit against the Chinese telecom giant that…
    - 3 days ago 14 Feb 20, 11:02am -
  • 500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users

    500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users

    Google removed 500 malicious Chrome extensions from its Web Store after they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers.These extensions were part of a malvertising and ad-fraud campaig…
    - 3 days ago 14 Feb 20, 9:59am -

Krebs On Security

  • A Light at the End of Liberty Reserve’s Demise?

    A Light at the End of Liberty Reserve’s Demise?

    In May 2013, the U.S. Justice Department seized Liberty Reserve, alleging the virtual currency service acted as a $6 billion financial hub for the cybercrime world. Prompted by assurances that the government would one day afford Liberty Reserve users…
    - 3 days ago 14 Feb 20, 6:48pm -
  • Microsoft Patch Tuesday, February 2020 Edition

    Microsoft Patch Tuesday, February 2020 Edition

    Microsoft today released updates to plug nearly 100 security holes in various versions of its Windows operating system and related software, including a zero-day vulnerability in Internet Explorer (IE) that is actively being exploited. Also, Adobe h…
    - 5 days ago 11 Feb 20, 11:13pm -

Dark Reading

SC Magazine

  • Fast and furious: breaches keep rolling in, orgs must act quickly

    Fast and furious: breaches keep rolling in, orgs must act quickly

    The threat landscape and nature of data breaches are constantly changing, requiring lightning fast response and throwing organizations into an nearly perpetual state of transformation. a panelist told attendees at the LegalTech Show in New York on Tu…
    - 3 Feb 16, 1:00pm -
  • Flash is dead. Long live Flash.

    Flash is dead. Long live Flash.

    Flash has a reputation for security flaws, but experts say it is time to develop a strategy for "dealing" because its ubiquity means it will remain for years to come. Alan R. Earls reports.
    - 3 Feb 16, 12:00pm -

Naked Security

Data Breach Today

  • Watchdog Agency: Improper Use of Medicare Data Rampant

    Watchdog Agency: Improper Use of Medicare Data Rampant

    HHS OIG Plans to Expand Investigation NationwideA federal watchdog agency next week will announce the expansion nationwide of an investigation into inappropriate access and use of Medicare beneficiaries' sensitive information for potential fraud and…
    - -
  • MIT Researchers: Online Voting App Has Security Flaws

    MIT Researchers: Online Voting App Has Security Flaws

    Voatz Smartphone App Used in 2018 Vulnerable to Hacking, Report AllegesMIT security researchers have published a paper that describes several security flaws in Voatz, a smartphone app used for limited online voting during the 2018 midterm elections.…
    - -

Bank Info Security

  • Watchdog Agency: Improper Use of Medicare Data Rampant

    Watchdog Agency: Improper Use of Medicare Data Rampant

    HHS OIG Plans to Expand Investigation NationwideA federal watchdog agency next week will announce the expansion nationwide of an investigation into inappropriate access and use of Medicare beneficiaries' sensitive information for potential fraud and…
    - -
  • MIT Researchers: Online Voting App Has Security Flaws

    MIT Researchers: Online Voting App Has Security Flaws

    Voatz Smartphone App Used in 2018 Vulnerable to Hacking, Report AllegesMIT security researchers have published a paper that describes several security flaws in Voatz, a smartphone app used for limited online voting during the 2018 midterm elections.…
    - -

CSO Online

  • The CSO guide to top security conferences, 2020

    The CSO guide to top security conferences, 2020

    There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts.Fortunately,…
    - 3 days ago 14 Feb 20, 11:00am -
  • What is phishing? How this cyber attack works and how to prevent it

    What is phishing? How this cyber attack works and how to prevent it

    Phishing definitionPhishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from…
    - 3 days ago 13 Feb 20, 10:04pm -

eSecurity Planet

  • 18 Hot Cybersecurity Startups for 2020
    Here are 18 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.
    - 31 days ago 16 Jan 20, 10:00pm -
  • Top Cybersecurity Companies
    These IT security vendors lead the market through their innovative offerings, range of products and services, customer satisfaction and annual revenue
    - 44 days ago 3 Jan 20, 10:31pm -

Network World

FierceITSecurity

Security Week

  • newIsraeli Army: Hamas Hackers Tried to ‘Seduce’ Soldiers

    Israeli Army: Hamas Hackers Tried to ‘Seduce’ Soldiers

    JERUSALEM (AP) — The Israeli military on Sunday said it has thwarted an attempt by the Hamas militant group to hack soldiers’ phones by posing as young, attractive women on social media, striking up friendships and persuading them into downloadin…
    - 13 hours ago 16 Feb 20, 7:18pm -
  • USCYBERCOM Shares More North Korean Malware Samples

    USCYBERCOM Shares More North Korean Malware Samples

    The U.S. Cyber Command (USCYBERCOM) has uploaded new malware samples to VirusTotal, all of which the Command has attributed to the North Korea-linked threat group Lazarus.read more
    - 2 days ago 15 Feb 20, 7:46pm -

US-CERT Current Activity

  • Be Cautious of Romance Scams
    Original release date: February 14, 2020This Valentine’s Day, the Cybersecurity and Infrastructure Security Agency (CISA) reminds users to be wary of internet romance scams. Cyber criminals partaking in this type of fraud target victims, gain their…
    - 3 days ago 14 Feb 20, 3:39pm -
  • North Korean Malicious Cyber Activity
    Original release date: February 14, 2020The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) have identified the following malware variants used by the North Korea…
    - 3 days ago 14 Feb 20, 12:40pm -

CIO Online

Virus Bulletin

  • Ransomware not a problem for half of businesses
    According to a report by IBM Security, 70 per cent of businesses that are the victim of a ransomware attack end up paying the ransom. However, the report also suggests that a little over half of businesses manage to avoid getting infected at all, sho…
    - 11 Jan 17, 10:13am -
  • Ransomware would be much worse if it wasn't for email security solutions
    The latest VBSpam test brings good news: at least 199 out of every 200 emails containing a malicious attachment were blocked by email security solutions. All of the full solutions tested achieved a VBSpam award, with five earning a VBSpam+ award.…
    - 5 Jan 17, 2:40pm -

Apple Security Announcement

    Homeland Security Today

    Security Focus

    Graham Cluley Latest

    US-CERT Bulletin

    • Vulnerability Summary for the Week of February 3, 2020
      Original release date: February 10, 2020 | Last revised: February 12, 2020The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS…
      - 7 days ago 10 Feb 20, 12:28pm -
    • Vulnerability Summary for the Week of January 27, 2020
      Original release date: February 3, 2020 | Last revised: February 4, 2020The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS s…
      - 14 days ago 3 Feb 20, 4:36pm -

    Zero Day Initiative

    Wired Threat Level

      Network World

      Symantec Vulnerabilities and Exploits

      Risky Business

      • Show notes: Risky Business #443
        Bad week for Macs, Hal Martin and CrowdStrike... Links to everything discussed in episode 443 of the Risky Business podcast.read more
        - 15 Feb 17, 3:13am -
      • Show notes: Risky Business #442
        So. Much. News. Links to everything discussed in episode 442 of the Risky Business podcast.read more
        - 8 Feb 17, 4:43am -

      Packet Storm Latest

      • Debian Security Advisory 4623-1
        Debian Linux Security Advisory 4623-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks.
        - 3 days ago 14 Feb 20, 3:25pm -
      • Slackware Security Advisory - mozilla-thunderbird Updates
        Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.
        - 3 days ago 14 Feb 20, 3:25pm -

      ITSecurityNews

      Secuity Affairs

      NIST Latest in IT

      Darknet - The Dark Side

      Top Security Alerts

      Symantec Virus Status Alerts

      • Norton 360 (later than 6.0) for Windows XP/Vista/7/8
        File-Based Protection (Traditional Antivirus)Definitions Created : 2/16/2020Definitions Released : 2/16/2020Definitions Version : 220216bSequence Number : 204771Extended Version : 2/16/2020 rev. 2…
        - -
      • Symantec Endpoint Protection 12.1.3 (or later)
        File-Based Protection (Traditional Antivirus)Definitions Created : 2/16/2020Definitions Released : 2/16/2020Definitions Version : 220216bSequence Number : 204771Extended Version : 2/16/2020 rev. 2…
        - -

      US- CERT Alerts

      Microsoft Comprehensive Alerts

      Internet Storm Center

      Cisco Security Alerts

      Microsoft Basic Alerts

      Compliance and Non Profit Boards News

      Federal Financial Institutions Examination Council News

      • Watchdog Agency: Improper Use of Medicare Data Rampant

        Watchdog Agency: Improper Use of Medicare Data Rampant

        HHS OIG Plans to Expand Investigation NationwideA federal watchdog agency next week will announce the expansion nationwide of an investigation into inappropriate access and use of Medicare beneficiaries' sensitive information for potential fraud and…
        - -
      • MIT Researchers: Online Voting App Has Security Flaws

        MIT Researchers: Online Voting App Has Security Flaws

        Voatz Smartphone App Used in 2018 Vulnerable to Hacking, Report AllegesMIT security researchers have published a paper that describes several security flaws in Voatz, a smartphone app used for limited online voting during the 2018 midterm elections.…
        - -

      HIPPA Omnibus Rule

      • Watchdog Agency: Improper Use of Medicare Data Rampant

        Watchdog Agency: Improper Use of Medicare Data Rampant

        HHS OIG Plans to Expand Investigation NationwideA federal watchdog agency next week will announce the expansion nationwide of an investigation into inappropriate access and use of Medicare beneficiaries' sensitive information for potential fraud and…
        - -
      • MIT Researchers: Online Voting App Has Security Flaws

        MIT Researchers: Online Voting App Has Security Flaws

        Voatz Smartphone App Used in 2018 Vulnerable to Hacking, Report AllegesMIT security researchers have published a paper that describes several security flaws in Voatz, a smartphone app used for limited online voting during the 2018 midterm elections.…
        - -

      PCI Compliance Press Releases

      PCI Compliance News

      Electronic Frontier Foundation | Deep Links

      More News and Media Coverage

      Latest Tweets