hanzo.co – In recent years, business communications have become more collaborative in nature to support remote work, improve productivity, and enhance the connection among teams. Since the arrival of the corona… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1313529541420343299
Hidden Trends? Captivating Research on Captive ALSPs
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post highlighting new research from Baretz+Brunelle on ALSPs. Baretz+Brunelle Research Uncovers Hidden Trend: 35% of Am La… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1313790430287409157
How 9/11 made alumna Cristina Rossman embrace her American identity | Haas News | Berkeley Haas
newsroom.haas.berkeley.edu – For Latinx Heritage Month we’re featuring members of our Berkeley Haas community. Here we profile Cristina (Bermudez) Rossman, MBA 00, on how the 9/11 attacks made her reconsider her identity. Cristi… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1312830018184151041
Conferences – NetDiligence
netdiligence.com – Our extremely popular NetDiligence® Cyber Risk Summit in Santa Monica focuses on emerging trends in today’s ever-changing cyber landscape. With more than 650 global insurance professionals and breach… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1312834579909218305
Holding the Rudder? Fall 2020 eDiscovery Business Confidence Survey Results
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post highlighting results from the Fall 2020 eDiscovery Business Confidence Survey. Editor’s Note: The eDiscovery Business… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1313091936807538697
Why developing cybersecurity education is key for a more secure future
helpnetsecurity.com – Cybersecurity threats are growing every day, be they are aimed at consumers, businesses or governments. The pandemic has shown us just how critical cybersecurity is to the successful operation of our… Tweeted by @BattistoniChris https://twitter.com/BattistoniChris/status/1313069434190344192
How Enterprises can consolidate Security and Data Privacy
medium.com – Data security and privacy is mission critical for every organization in 2020 as cyber security threats¹ increase rapidly. As information stores expand followed by out-of-control costs, and increasing… Tweeted by @DataScientistsF https://twitter.com/DataScientistsF/status/1313016626116259840
liamg/gitjacker
github.com – Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage to recover a significant portion of a repositor… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1312444802848309248
Facebook ‘SilentFade’ Malware Attack Stole Credentials For Years
threatpost.com – Facebook has detailed a wide-scale Chinese malware campaign that targeted its ad platform for years and siphoned $4 million from users’ advertising accounts. Dubbed SilentFade (short for “Silently ru… Tweeted by @Informasec https://twitter.com/Informasec/status/1312578464231419904
ECB Takes Major Step Toward Introducing a Digital Euro
bloomberg.com – The European Central Bank will start experimenting with a digital version of the euro while holding a public consultation in a major step toward introducing the technology. “Our role is to secure tru… Tweeted by @SCAsolutions https://twitter.com/SCAsolutions/status/1312712823110135809
Egregor Ransomware Threatens Companies to Pay Ransom Within 3 days
gbhackers.com – The threat actor group behind new ransomware dubbed “Egregor” targets companies to steal sensitive data and then encrypt all the files. Researchers from Appgate, discovered the ransomware, according … Tweeted by @gbhackers_news https://twitter.com/gbhackers_news/status/1312660197043654657
IoT Security – Part 16 (101 – Hardware Attack Surface: I2C)
payatu.com – This blog is part of the IoT Security series, where we discuss the basic concepts about the IoT/IIoT eco-system and its security. If you have not gone through the previous blogs in the series, I will… Tweeted by
Rampiva and the RYABI Group Combine to Create Global Data Automation Company
prnewswire.com – NEW YORK, Oct. 2, 2020 /PRNewswire/ — Rampiva Technology Inc., an automation and reporting platform for the Nuix data processing engine, and The RYABI Group, a certified Nuix and Rampiva reseller, t… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1312106690871926785
Arbitrary code execution on Facebook for Android through download feature
medium.com – Recently I discovered an ACE on Facebook for Android that can be triaged through download file from group Files Tab without open the file. I was digging on the method that Facebook use to download fi… Tweeted by
Sysmon Internals – From File Delete Event to Kernel Code Execution
undev.ninja – On April 2020, Mark Russinovich announced the release of a new event type for Sysmon version 11.0: event ID 23, File Delete. As indicated by the name, it logs file delete events that occur on the sys… Tweeted
Digital Forensics: Putting the “E” in E-Discovery
eventbrite.com – Is that document authentic? When was that photo actually taken? Who is the real owner of that file? Where did that email come from? The tools and techniques used by Digital Forensics experts answer t… Tweeted by @acedsonline
From Metadata to Mass Surveillance? European Data Retention Revisited
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post highlighting the new booklet from EDRi titled Digital Rights Revisited. Editor’s Note: Shared with permission* from E… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1312382979713490945
Cyber Insurance: The Market’s View – Advisen Ltd.
advisenltd.com – Cyber Insurance- The Market’s View The seventh annual edition of PartnerRe and Advisen’s comprehensive global survey of the cyber insurance market is now available, offering the latest insight into t… Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1311712476061368323
Technical Advisory – wolfSSL TLS 1.3 Client Man-in-the-Middle Attack (CVE-2020-24613)
research.nccgroup.com – wolfSSL is a C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments. wolfSSL incorrectly implements the TLS 1.3 client state machine. This allows attackers in a privileged … Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1311715760436252677
Forcing Firefox to Execute XSS Payloads during 302 Redirects
gremwell.com – During a recent engagement I identified an open redirect where a GET parameter would be reflected as-is in the HTTP response Location header without any kind of sanitization. Something similar to thi… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1311712936964964352