CISOs struggling to prep for security audits

Ransomware Attacks Disrupt School Reopenings

Microsoft Releases September 2020 Security Patches For 129 Flaws

VPNs: The Cyber Elephant in the Room

Securing Active Directory accounts against password-based attacks

Surging CMS attacks keep SQL injections on the radar during the next normal

Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting Today

You Musk be joking: A mind-reading Neuralink chip in a pig’s brain? Downloadable memories? Telepathy? Watch and judge for yourself

It’s never the data breach — it’s always the cover-up

The global cost of cybercrime per minute to reach $11.4 million by 2021

Worldwide AI spending to reach more than $110 billion in 2024

Attackers Use Unicode & HTML to Bypass Email Security Tools

A Google Drive ‘Feature’ Could Let Attackers Trick You Into Installing Malware

‘Next-Gen’ Supply Chain Attacks Surge 430%

Microsoft Issues Emergency Security Updates for Windows 8.1 and Server 2012 R2

A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide

India to run optic fibre to 450,000 villages in 1,000 days and give 1.3bn a digital Health ID

In reality, how important is zero trust?

Organizations knowingly ship vulnerable code despite using AppSec tools

Organizations knowingly ship vulnerable code despite using AppSec tools

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

Toshiba formally and finally exits laptop business

Open source tool Infection Monkey allows security pros to test their network like never before

2019 Breach Leads to $80 Million Fine for Capital One

Black Hat: Hackers can remotely hijack enterprise, healthcare Temi robots

Cybercriminals are developing and boosting their attacks

Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack

Analysis of 92 billion rejected emails uncovers threat actors’ motivations

Telstra DNS falls over after denial of service attack

Phishing campaigns, from first to last victim, take 21h on average

NIST selects algorithms to form a post-quantum cryptography standard

Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

Psst.. You may want to patch this under-attack data-leaking Cisco bug – and these Ripple20 hijack flaws

Cabinet Office takes over control of UK government data: Mundane machinery or Machiavellian manoeuvrings?

Email Security Features Fail to Prevent Phishable ‘From’ Addresses

27% of consumers hit with pandemic-themed phishing scams

20,000+ new vulnerability reports predicted for 2020, shattering previous records

What Organizations Need to Know About IoT Supply Chain Risk

7 VPN firms with no-logs policy end up exposing 1.2 TB of user data

Cisco releases security fixes for critical VPN, router vulnerabilities

DHS CISA tells government agencies to patch Windows Server DNS bug within 24h

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

VPN firm that claims zero logs policy leaks 20 million user logs

Is DNS a vital component of your security strategy?

Remote working security challenges urge MFA implementation

A hacker is selling details of 142 million MGM hotel guests on the dark web

Zero-Trust Efforts Rise with the Tide of Remote Working

How to make your IT security go beyond your network – and make people your perimeter

Over 1,300 phishing kits for sale on hacker forum

Amazon tells employees to remove TikTok from their phones due to security risk

Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data

USB storage devices: Convenient security nightmares

15 billion credentials from 100,000 data breaches sold on dark web

Majority of firms concerned about public cloud security, most have suffered breach

70% of organizations experienced a public cloud security incident in the last year

Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple Products

High-flying Microsoft exec jumps to Magic Leap as CEO. No, we haven’t got that the wrong way round

Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

Coronavirus: Fujitsu announces permanent work-from-home plan

Infosec community disagrees with changing ‘black hat’ term due to racial stereotyping

F5 patches vulnerability that received a CVSS 10 severity score

Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking

VMware is acquiring Datrium for hybrid cloud disaster recovery

Microsoft releases emergency security update to fix two bugs in Windows codecs

Critical flaw opens Palo Alto Networks firewalls and VPN appliances to attack, patch ASAP!

Files Stolen from 945 Websites Discovered on Dark Web

SOC team members battle with burnout, overload and chaos

Most malware in Q1 2020 was delivered via encrypted HTTPS connections

Containers to capture 15 percent of all enterprise apps across 75 percent of business by 2024

Ransomware perspectives: The shape of things to come

Cloud Threats and Priorities as We Head Into the Second Half of 2020

Companies are rethinking their approach to privacy management

Australian government to build AU$4.3 million online microcredentials marketplace

Adobe wants users to uninstall Flash Player by the end of the year

How much is your data worth on the dark web?

Companies still struggle with SOC staff shortages, security skills gap

New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking

Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote attack

As IoT devices evolve, risk management needs improvement

New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users

Philippines government makes cloud-first a post-pandemic ‘new normal’ for all agencies

Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room

What is the true extent of the modern corporate digital attack surface?

Average cost of DNS attacks hovering around $924,000

Intel CPUs Vulnerable to New ‘SGAxe’ and ‘CrossTalk’ Side-Channel Attacks

SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol

Another globally distributed cloud native SQL database on the rise: Yugabyte Raises $30 Million in Series B Funding

Wipro and IBM collaborate to assist customers embark on a secure hybrid cloud journey

Five signs a virtual CISO makes sense for your organization

Hackers using malicious CV files to infect PCs with banking trojan

New ‘Tycoon’ Ransomware Strain Targets Windows, Linux

Cisco’s warning: Critical flaw in IOS routers allows ‘complete system compromise’

Cybercriminals exposed 5 billion records in 2019, costing U.S. organizations over $1.2 trillion

Cloud computing: Google signs ‘milestone’ discount deal with UK government

Blackpoint Cyber launches 365 Defense, a Microsoft 365 security add-on for its MDR service

Microsoft ‘to replace journalists with robots’

Famous video apps with 157M+ installations operating as spyware

Minted confirms data breach as Shiny Hunters sell its database

Hackers breached six Cisco servers through SaltStack Salt vulnerabilities

Malaysia’s Axiata to pick two 5G vendors, in move that could curb reliance on Huawei

Maintaining the SOC in the age of limited resources

IBM’s sacking spree reaches Australia and as staff wait to exit they’re being offered $4k to find new workers

Amazon in advanced talks to buy self-driving startup Zoox: WSJ

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Tencent to invest $70 billion in ‘new infrastructure’

So how are your remote working tools shaping up?

IoT security: In 2020, action needs to match awareness

Thousands of enterprise systems infected by new Blue Mockingbird malware gang

6 million COVIDSafe downloads and a AU$60b JobKeeper data error

Nutanix and ServiceNow expand integration to help customers streamline their IT operations and costs

Personal data of 12 million Facebook users exposed online

25 million user records leak online from popular math app Mathway | ZDNet

Windows malware opens RDP ports on PCs for future remote access

Privilege escalation vulnerability patched in Docker Desktop for Windows

IBM making big job cuts – even to Watson and AI – as it ‘pivots’ to cloud

HPE’s Black Thursday: Staff face pay cuts or the ax, office closures to save $1bn+ after coronavirus slams IT titan

Hackers Serve Up Stolen Credentials from Home Chef

Is Zero Trust the Best Answer to the COVID-19 Lockdown?

New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks

db8151dd breach- Contact management firm leaks 22 million emails

Inside big tech’s high-stakes race for quantum supremacy

Security threats associated with shadow IT

Supercomputers hacked across Europe to mine cryptocurrency

Facebook buys GIF-maker Giphy to add to Instagram team

Mikroceen RAT backdoors Asian government networks in new attack wave

Hackers target the air-gapped networks of the Taiwanese and Philippine military

Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks

Two Critical vulnerabilities in Sophos Cyberoam firewall can allow network takeover

New malware Ramsay can steal data from air-gapped computers

Researcher Spots New Malware Claimed to be ‘Tailored for Air‑Gapped Networks’

Data Breach Exposes Four Million Dating App Users

Researchers detected 400 million malware infections in April 2020

Hackers infect authentic 2FA app to infect Mac devices with malware

US Marshals Service exposed prisoner details in security breach

Google expects its staff to work from home until 2021 and it’s not alone

Hacker gains access to a small number of Microsoft’s private GitHub repos

Jump in vulnerable RDP ports is leaving networks open to hacking and cyberattacks

Facebook Launches ‘Discover,’ A Secure Proxy to Browse the Internet for Free

Sensitive user data found in Tesla car parts sold on eBay

Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

New Kaiji malware targets IoT devices via SSH brute-force attacks

Hacker leaks 15 million records from Tokopedia, Indonesia’s largest online store

As Brit cyber-spies drop ‘whitelist’ and ‘blacklist’, tech boss says: If you’re thinking about getting in touch saying this is political correctness gone mad, don’t bother

Dell to unleash hybrid server/storage boxen that can run virtual machines

New nasty Android EventBot malware infects devices by evading 2FA

Here’s the NSA’s guide for choosing a safe text chat and video conferencing service

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

Microsoft Office 365: US issues security alert over rushed remote deployments

Organizations look to build resiliency with hybrid and multi-cloud architectures

Android users worldwide hit by sophisticated Google Play malware

Researchers Spot Banking Trojan Using #COVID19 Crisis to Attack Users

Ransomware hackers leak pharmaceutical giant’s data on dark web

Chinese COVID-19 detection firm hacked; source code sold on dark web

Dark web hackers selling 400,000 South Korean & US payment card data

VictoryGate cryptominer infected 35,000 devices via USB drives

Wake up, Neo: Microsoft mulls using your brain waves or body heat to mine crypto-currency while viewing ads

Symlink race bugs discovered in 28 antivirus products

Latest iOS Text Bomb Bug Crashing iPhones with Sindhi Characters

Post-lockdown life in Wuhan is a warning to the world

Work-from-home creates multitude of opportunities for leaks

Parablu launches BluVault, a SaaS backup solution for Microsoft Office 365

Google shifting workloads to run when the sun will shine and the wind will blow

Security researcher identifies new APT group mentioned in 2017 Shadow Brokers leak

Zero-Day Warning: It’s Possible to Hack iPhones Just by Sending Emails

Google Cloud’s Anthos for AWS generally available, Microsoft Azure in preview

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

Has coronavirus killed the UK’s startup dreams? Ask Deliveroo

Netflix says subscriptions just boomed but tells investors it’s no money heist and they should expect stranger things

Python 2 bows out after epic transition. And there was much applause because you’ve all moved to version 3, right? Uh, right?

Google helps users reduce Google Cloud costs

Researcher Discloses 4 Zero-Day Bugs in IBM’s Enterprise Security Software

IBM CEO Krishna outlines grand plan: Technical prowess, growth, client focus

Three years ago, IBM ordered staff to work in central hubs. Now its new CEO ponders mid-pandemic: Is there a better way of doing things?

IBM misses revenue estimates but cloud jumps; withdraws forecast

Hackers selling 267 million Facebook records on hacker forum

Fraud & hacking guides are the most sold item on dark web

Google calls a halt on Chrome 82, but the version 83 beta has arrived early – so it’s coding and bug finding time ahead

PoetRAT Trojan targets energy sector using coronavirus lures

Google: We Block 240 Million Daily #COVID19 Spam Messages

Academics steal data from air-gapped systems using PC fan vibrations

Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property

Energy Giant EDP Hit With €10 Million Ransomware Threat

Slack Incoming Webhooks Can Be Weaponized in Phishing Attacks

Phishing kit prices skyrocketed in 2019 by 149%

Another day, another Google cull – Chocolate Factory axes 49 malicious Chrome extensions from web store

Microsoft April 2020 Patch Tuesday comes with fixes for four zero-days

Microsoft Issues Patches for 3 Bugs Exploited as Zero-Day in the Wild

Second-wave dotcom Uber-investor Softbank forecasts gargantuan losses as world economy faces slump

Microsoft’s Teams clocks 2.7 billion minutes of meetings in a single day as April starts to run out for Windows 10 2004

Russian state hackers behind San Francisco airport hack

52k Iranian ID cards with selfies sold on dark web & hacking forum

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic

Takeaway.com says orders had only temporarily decline in March

Hackers are scanning for vulnerable VPNs in order to launch attacks against remote workers

Microsoft: Cyber-Criminals Are Targeting Businesses Through Vulnerable Employees

Microsoft to add DANE and DNSSEC support to Exchange Online servers

Microsoft buys corp.com domain in the name of customer security

Secure Remote Working During COVID-19 — Checklist for CISOs

Email provider got hacked, data of 600,000 users now sold on the dark web

IBM taps former Bank of America CTO to oversee cloud business

Zoom Blow as Thousands of User Videos Are Found Online

Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days

Zoom Patches Three New Bugs in Scramble to Support Remote Workers

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

Most find data security challenging with respect to UCaaS/CCaaS deployments

Terabytes of OnlyFans data being sold on hacking forum

Are your MS SQL servers part of a cryptomining botnet? Check now!

Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment Data

How can you strengthen an enterprise third-party risk management program?

Why All Employees Are Responsible for Company Cybersecurity

Millions of routers running OpenWRT vulnerable to attack

CISO’s guide to choosing an automated security questionnaire platform

Houseparty denies hacking user accounts; offers $1 million reward

Hackers sending malware infected USBs with Best Buy Gift Cards

Microsoft buys cloud-based 5G services vendor Affirmed Networks

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

Critical RCE Bug Affects Millions of OpenWrt-based Network Devices

Working from home? Switch off Amazon’s Alexa (say lawyers)

Brazilian startup develops rapid Covid19 test

DDoS botnets have abused three zero-days in LILIN video recorders for months

German army’s sensitive data found on laptop bought from eBay

Cisco fixes root privilege, command injection vulnerabilities in Cisco SD-WAN solution

Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest

Windows 10 or Mac user? Patch Adobe Reader and Acrobat now to fix 9 critical security flaws

VMware patches privilege escalation vulnerability in Fusion, Horizon

Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusion

Nigerian spammer made 3X average national salary firehosing macro-laden Word docs at world+dog

Medical robots pick up the slack in overloaded hospitals

Amazon to hire 100,000 employees to cope with COVID-19 demand

How the Rise of IoT Is Changing the CISO Role

Microsoft Issues March 2020 Updates to Patch 115 Security Flaws

Hackers leak up to 4 TB of OnlyFans content for download

Microsoft is retiring its MCSA, MCSD and MCSE certifications in June 2020

One in four Americans won’t do business with data-breached companies

Maybe data centers aren’t actually so bad for the planet

Ransomware victims thought their backups were safe. They were wrong

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Microsoft to open Azure regions in Spain, expands Telefonica relationship

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users

Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks

Slickwraps Breach Hits 857,000 Customers

PayPal rejects report that exposed critical account takeover vulnerabilities

Changing the mindset of the CISO: From enforcer to enabler

#Privacy: Unprotected machine IDs set to cause global losses of at least $51bn losses

Cybersecurity vs. Information Security: Is There a Difference? – Cloud Academy

Passwordless authentication is here and there, but not everywhere

97% of IT leaders worried about insider data breaches

Apple joins industry effort to eliminate passwords

New Jersey Hospital Network Faces Lawsuit Over Ransomware Attack

Redefining Zero Trust: Does Zero Really Mean Zero?

How to Get CISOs & Boards on the Same Page

Cybersecurity job market set to worsen once more – ITProPortal

Private details of 10.7 million MGM Hotel guests sold on Dark Web

#Privacy: C-suite fears grow over cybersecurity talent shortage

#Privacy: Cybercriminals exploited previously stolen credentials or known software vulnerabilities last year

FireEye Mandiant M-Trends 2020 Report Reveals Cyber Criminals Are Increasingly Turning to Ransomware as a Secondary Source of Income – Yahoo Finance

Hack Of Patient Survey Firm NRC Health Raises Questions Over US Records Security

Researchers recovered 9 billion email & password combos in 2019

SIEM Still Creates Complexity and Administration Challenges

5 Strategies to Secure Cloud Operations Against …

Chinese Hackers Target Asian Betting Firms

Russia Blocks Encrypted Email Service Tutanota

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

Two-Thirds of CISOs Struggling with Skills Shortages

The role played by CISOs in addressing cybersecurity challenges: Akshay Aggarwal, Oracle India – DATAQUEST

Iranian APT group hacking VPN servers for “Fox Kitten Campaign”

Global Cyber Threats on the Rise with No Respite – Latest Hacking News

A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices

Artificial Intelligence – The Next Frontier in IT Security? | Fast Future Publishing

Kaspersky reveals magnitude of British business ‘cyber-complacency’ – Software Testing News

New Election App Breaches Exposed Data on Millions of Israelis, Again

The Good, the Bad and the Ugly in Cybersecurity – Week 7

IoT device security: 5 tips for enterprises

Pay for these four tech jobs is rocketing. Cloud computing is the cause

Download: Definitive ‘IR Management and Reporting ‘ Presentation Template

Mac threats are growing faster than their Windows counterparts

Data security startup Open Raven launches to prevent data breaches – Business Insider

Update Microsoft Windows Systems to Patch 99 New Security Flaws

Adobe Releases Patches for Dozens of Critical Flaws in 5 Software

Cybersecurity is a board level issue: 3 CISOs tell why

How to Protect Your Network Infrastructure and Apps from DDoS Attacks?

Shadow IT accounts with weak passwords endanger organizations

The Oscar nominated movie you just downloaded could be a malware

Hackers can steal data from air-gapped PC using screen brightness

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Hackers Exploited Twitter Bug to Find Linked Phone Numbers of Users

Zero Trust: a quick guide to upping your cybersecurity game

Want FREE UNLIMITED ACCESS?

free Access to all content

our exclusive human error newsletter

we make a 10p donation to rock2recovery
for every signup!

This website uses cookies to ensure you get the best experience on our website.

contact THE HUMAN ERROR

For further information on how The Human Error can help you. Fill out some details below, or give us a call.



Tel: 03300 417126

YOU HAVE

YOU NEED

SHINE A LIGHT ON ALL THREATS.
See All The Gaps.
ALERTS IN SECONDS.

Features:

70,000 Thoughts a day.
We Make Mistakes.