'Oh sh..' – the moment an infosec bod realized he was tracking a cop car's movements by its leaky cellular gateway

<b>Black Hat</b> Internet boxes blab coordinates on login pagesIf you want to avoid the cops, or watch deliveries and call-outs by trucks and another …

San Francisco

Assessing Mitigating Increased Exposure to Third-Party Risk

50%<p>50%<p>As we increasingly connect with each other digitally, CyberGRX CRO Scott Schneider believes we need to be much more diligent about sharing …

Information Security

Apple confirms teen hacker took no customer data

Security Editor<p>Follow:<p>An Australian teenager has pleaded guilty to charges of breaking into Apple’s main computer network and downloading data, …



#CiscoChampion Radio is a podcast series by technologists for technologists. In this episode, Cisco Champion Tony Cuevas and Steve Kostyk interview Fish Fishburne on InfoSec topics at Cisco Live in Orlando.<p><b>Get the Podcast</b><p>Listen to this episode in SoundCloud<br>• SUBSCRIBE on iTunes and listen to all …

Cisco Systems

2.6bn records have been exposed in data breaches so far this year

New data from Risk Based Security shows the number of records exposed remains high despite the number of publicly declared breaches levelling off.<p>US …

Social Issues

SamSam: Inside One of the World's Top Forms of Ransomware

Since 2015, Sophos has investigated the SamSam ransomware campaign, and it has just released its findings in a new report. What can you learn from …

Private Sector

2018 Pwnie Awards: Who Pwned, Who Got Pwned

A team of security experts round up the best and worst of the year in cybersecurity at Black Hat 2018.

Black Hat

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

Lisa leads Global Security Research and Development at Accenture Labs. In this role, she curates and manages a portfolio of cyber research, including …

Machine Learning

UK cyber cops: Infosec pros could help us divert teens from 'dark side'

Police seek mentor-like techies to help talented kidsUK police are looking to cybersecurity firms to help implement a strategy of steering youngsters …


InfoSec Institute launches Security Awareness Practitioner Certification

InfoSec Institute launched its Certified Security Awareness Practitioner (CSAP) boot camp. The course is to certify professionals with the expert …

Information Security

William Caraher on LinkedIn: "Great  #blockchain  primer."

Chief Information Officer (CIO) & Director of Ops. | MBA Professor | InfoSEC | BlockChain DLT | i.c. Stars | Fitness

Information Security

Enterprises: Someone on Your Security Team is Likely a Grey Hat Hacker

<b>Companies Should Not Dismiss a Bit of Grey Hatting by Staff as Just a Form of Letting Off Steam</b><p>The cost of cybercrime is normally described as direct …


Everything is… less terrible

To hack: to study a system’s flaws and emergent properties, and use them for your own ends; to instill your own instructions into a computer’s memory, and coerce its microprocessor to run them. To pick at the air gaps and missed stitches in the many overlapping layers of software from which our …

Information Security

Secure Channels Announces Beta Testing of New XFA Mail from the XOTIC Platform at Black Hat USA 2018

IRVINE, Calif., Aug. 7, 2018 /PRNewswire/ -- Secure Channels, a winner of the InfoSec Award 2018 for "Encryption, Cutting Edge", announced today it will unveil several new data security solutions at Black Hat USA 2018 in the "Innovation City" exhibit and showcase its cutting-edge security solutions …

Black Hat

Ep 12 Georgia Weidman: Writing books, riding horses, and starting companies

Information Security

John McAfee's 'unhackable' crypto-wallet allegedly hacked in a week

A hacker says McAfee and Bitfi won't pay the $250,000 bounty, but they disagree that the hack was a success.<p>Someone claims to have successfully hacked an "unhackable" cryptocurrency wallet.<p>A self-described IT geek in the Netherlands who goes by @OverSoftNL on Twitter tweeted Wednesday about gaining …


When your Uber driver is a spy

Like other migrating beasts, hackers travel huge distances for feeding, breeding, and breaking things every summer -- at Defcon in Las Vegas. The way they move about the city is driven primarily by the availability of free booze at corporate parties or the convenience of air-conditioned infosec …

Social Issues

HYAS, an infosec startup that identifies cybercriminals and helps law enforcement track their location, raises $6.2M Series A led by Microsoft's M12

Information Security

Kai Roer Author of the Month Interview Live from InfoSec

Information Security

Canadian cybersecurity startup HYAS pulls in $6.2 mln Series A

Victoria, British Columbia-based cybersecurity company <b>HYAS</b> has secured $6.2 million in Series A funding. <b>M12</b>, <b>Microsoft’</b>s venture fund led the round …

Vancouver Island

Adversary Mindset

TSS’ Inaugural Red Team Training<p>It’s a recurring theme in the InfoSec community for experienced practitioners to feel that they lack knowledge in …

Social Issues

How AI Could Become the Firewall of 2003

An over-reliance on artificial intelligence and machine learning for the wrong uses will create unnecessary risks.

Machine Learning

1.4 million patient records breached in UnityPoint Health phishing attack

This is the second breach for the health system this year, and the biggest health data breach of 2018 in the U.S.


Marketers, Authentication Is Now Our Responsibility: Are You Ready?

Digital marketing has never been more sophisticated or successful. To all the CMOs, strategists and designers who do the hard work that increases sales: Great job! Now comes the responsibility of ensuring those new customers don’t rob your company.<p>As head of global marketing at a fraud prevention …


NAB CISO makes move to QBE Insurance

National Australia Bank (NAB) chief information security officer Andrew Dell is departing the bank to join QBE Insurance as global CISO.<p>Dell will be …

National Australia Bank

Push for code of conduct to help fight sexism in security

However bad you think gender disparity is in the information security sector, the reality is probably worse: Research backed by information security …

Technology (Australia)

CEO guidance: Handling dynamic change in the cybersecurity industry

In a little over 18 months since SonicWall split from Dell, the company has become operationally and financially independent. “In fact, while …


Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

SPONSOR<p>Author:<p>Published<p>in Sponsor<p><i>Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.</i><p>Recorded Future …


New Underminer Exploit Kit Discovered Pushing Bootkits and CoinMiners

Security researchers have discovered a new exploit kit, currently active mainly in Asian countries, which, they say, has been busy spreading bootkits …

Trend Micro

Threatpost News Wrap Podcast For July 27

Threatpost editors Tom Spring and Lindsey O'Donnell talk about the week's biggest news.

Online Privacy