Top news of the week: 26.06.2020.

#cyberattacks #Coronavirus #mobilesecurity #securitynews #infosecurity #CISO #cybersecuritynews #EU #hospitals #Chinese

Threats And Attacks

On Jun 25, 2020
@McAfee shared
"Security professionals have less visibility and control over WFH environments... so any evaluation of mobile security should be based on several fundamental criteria" - @anandramanathan via @helpnetsecurity. https://t.co/GIgBhHK35o
Open

How do I select a mobile security solution for my business?

How do I select a mobile security solution for my business?

In order to select a suitable mobile security solution for your business, you need to consider a lot of factors. We talk to experts that can help.

On Jun 26, 2020
@EduardKovacs shared
RT @SecurityWeek: US Cybercom Virtual War Game Girds Against Increased Threats https://t.co/GkJTTrqAvo
Open

US Cybercom Virtual War Game Girds Against Increased Threats

US Cybercom Virtual War Game Girds Against Increased Threats

Cybercom accelerated development of a virtual training environment to better analyze ways to protect threats to critical infrastructure, including in energy and transportation systems.

On Jun 25, 2020
@teamcymru shared
Von der Leyen said #Chinese #cyberattacks on #EU #hospitals cannot be tolerated https://t.co/5r7gdCyQU8
Open

Von der Leyen said Chinese cyberattacks on EU hospitals cannot be tolerated

Von der Leyen said Chinese cyberattacks on EU hospitals cannot be tolerated

European Commission President Ursula von der Leyen called out China for launching cyberattacks EU hospitals and health care institutions during the COVID-19 pandemic. European Commission ...

On Jun 22, 2020
@threatintel shared
Data from hundreds of U.S. police departments leaked online https://t.co/KI3WcAIgsF #BlueLeaks
Open

‘BlueLeaks’ Exposes Files from Hundreds of Police Departments

‘BlueLeaks’ Exposes Files from Hundreds of Police Departments

Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. In a post on Twitter, DDoSecrets said the …

On Jun 24, 2020
@cloudsa shared
As telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud. Read more in this Dark Reading article covering our newest research document on telehealth. https://t.co/ryBveSMS2C
Open

Cloud Security Alliance Offers Tips to Protect Telehealth Data

Cloud Security Alliance Offers Tips to Protect Telehealth Data

As telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud.

On Jun 23, 2020
@Treadstone71LLC shared
EXPERT REACTION: Major cyber attacks on Aussie governments and business https://t.co/XpcIZkZeBF #cyberattacks
Open

EXPERT REACTION: Major cyber attacks on Aussie governments and business

EXPERT REACTION: Major cyber attacks on Aussie governments and business

EXPERT REACTION: Major cyber attacks on Aussie governments and business Prime Minister Scott Morrison has this morning announced Australian organisations, including governments and ...

On Jun 24, 2020
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about How to Secure IT And OT #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/LfOde6MsK8 by Christopher Dobrec @ArmisSecurity who we hope to see @BlackHatEvents 2020 #CDM https://t.co/JSJ550ULF4
Open

How to Secure IT And OT In Industrial and Manufacturing Environments

How to Secure IT And OT In Industrial and Manufacturing Environments

By Christopher Dobrec, Vice President of Product Marketing at Armis Operational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to ...

On Jun 25, 2020
@DarkReading shared
Lucifer Malware Aims to Become Broad Platform for Attacks https://t.co/n9RJxejMr2 viay @roblemos #Lucifer #DDoS #cryptomining
Open

Lucifer Malware Aims to Become Broad Platform for Attacks

Lucifer Malware Aims to Become Broad Platform for Attacks

The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating ...