Archive for the ‘cyber security’ Category

Pwn2Own Tokyo Day one: NETGEAR Router, WD NAS Device hacked

Pwn2Own Tokyo 2020 hacking competition is started, bug bounty hunters already hacked a NETGEAR router and a Western Digital NAS devices. The Pwn2Own Tokyo is actually coordinated by Zero Day Initiative from Toronto, Canada, and white hat hackers taking part in the competition have to demonstrate their ability to find and exploit vulnerabilities in a […]

Leave a Comment

Cyber Security Training Courses

Cyber Security Training Courses via Simpliv To review each course download a pdf of Cyber Security Training Courses

Leave a Comment

HP Printer Bug Bounty Expands To Include Cartridge Security

Including HP Official Ink and Toner cartridge security, HP announced rewards up to $10,000 under the new printer bug bounty program. After pioneering a bug rewards program for printer security, HP takes another step in this direction. As announced, HP has expanded its bug bounty program for printers to include cartridge security vulnerabilities. Source: HP […]

Leave a Comment

How cyber security can protect your business

Christopher Wright is one of IT Governance Publishing’s most prolific writers, having released five books with us over the past six years. His work covers many different topics, including advice on organizational cyber security, project management and risk management auditing. In How Cyber Security Can Protect Your Business – A guide for all stakeholders, Wright provides […]

Leave a Comment

iOS 14 default app settings automatically reset to Mail and Safari after reboot – 9to5Mac

One of the new features in iOS 14 is the ability to change the default email or browser app to a third-party alternative such as Chrome, Edge, or Outlook. A bug in the first public release of iOS 14, however, causes your default browser or mail app setting to reset to Mail or Safari when […]

Leave a Comment

Is China the World’s Greatest Cyber Power?

While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China’s aggressive approach to cyber operations has made it perhaps the world’s greatest cyber power. Source: Is China the World’s Greatest Cyber Power? Is China the World’s Greatest Cyber Power? “The goal is simple: break […]

Leave a Comment

Mozilla offers rewards for Bypassing Firefox Exploit Mitigations

Mozilla has expanded its bug bounty program including rewards for bypass methods for the exploit mitigations and security features in Firefox. Source: Mozilla offers rewards for Bypassing Firefox Exploit Mitigations Why Firefox is the best browser for privacy and how to configure things properly

Leave a Comment

Black Hat USA Announces New Community Programs to Address the Needs of Information Security Professionals

Programs will address diversity and inclusion, mental health and career education. “The technical content that is presented on the Black Hat stage each year is an important contribution to the industry, but we’ve found that more sensitive topics such as mental health and diversity within the information security community are often not highlighted enough,” said […]

Leave a Comment

Twitter stepped up search to fill top security job ahead of hack

Search for a chief information security officer Twitter Inc had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter said hackers had targeted employees with access to its […]

Leave a Comment

The 10 Steps to cyber security

10 pieces of technical advice you should consider putting in place. Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security. Source: The 10 Steps to cyber security Download a Security Risk Assessment Steps paper! Subscribe to DISC InfoSec blog by Email Take an awareness quiz to test your […]

Leave a Comment

The Future of Cybersecurity Jobs

  The Future of Cybersecurity Jobs  The future of work is online and remote. This has been proven by the recent Covid-19 pandemic, as companies who had been reluctant to embrace the remote-work trend suddenly found themselves running an almost entire remote-based company. As things stand, it is very likely that much of the working […]

Leave a Comment

Tall Order for Small Businesses: 3 Tips to Find Tailored Security Solutions

SMBs are responsible for nearly 44% of US economic activity, but given the current climate, it can be difficult for them to find available and/or affordable resources. Source: Tall Order for Small Businesses: 3 Tips to Find Tailored Security Solutions FIC2020: The top cybersecurity trends to watch for Download a vCISO template Subscribe to DISC […]

Leave a Comment

Apple strong-arms entire CA industry into one-year certificate lifespans

Apple, Google, and Mozilla reduce the lifespan for HTTPS certificates to 398 days, against the wishes of Certificate Authorities. A decision that Apple unilaterally took in February 2020 has reverberated across the browser landscape and has effectively strong-armed the Certificate Authority industry into bitterly accepting a new default lifespan of 398 days for TLS certificates. […]

Leave a Comment

Good Cyber Hygiene in a Post-Pandemic World Starts with Us

Three ways that security teams can improve processes and collaboration, all while creating the common ground needed to sustain them. Source: Good Cyber Hygiene in a Post-Pandemic World Starts with Us Cyber ‘hygiene’ could resolve 90% of cyber attacks | FT Business Notebook Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe […]

Leave a Comment

A daily average of 80,000 printers exposed online via IPP

Experts found tens of thousands of printers that are exposed online that are leaking device names, organization names, WiFi SSIDs, and other info. Source: A daily average of 80,000 printers exposed online via IPP Exploiting Network Printers How To Hack A Printer And See All Documents Printed Download a Security Risk Assessment steps paper! Download […]

Leave a Comment

CyberSecurity Awareness Quiz

Take an InfoSec awareness quiz to test your basic cybersecurity knowledge Loading… Would like to know more on InfoSec Awareness… Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by Email

Leave a Comment

Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

The publication of ‘Vault 7’ cyber tools by WikiLeaks marked the largest data loss in agency history, a task force concluded. The theft of top-secret computer hacking tools from the CIA in 2016 was the result of a workplace culture in which the agency’s elite computer hackers “prioritized building cyber weapons at the expense of […]

Leave a Comment

5 principles for effective cybersecurity leadership in a post-COVID world

  As more people work from home due to COVID-19, cybersecurity operations are facing tremendous challenges. These five principles can help Chief Information Security Officers (CISOs) and cybersecurity leaders ensure effective business continuity in the “new normal.” Source: 5 principles for effective cybersecurity leadership in a post-COVID world 7 Security Risks and Hacking Stories for Web […]

Leave a Comment

10 Steps to Cyber Security

10 Steps to Cyber Security pdf Free Download Cybersecurity For Dummies Cheat Sheet 10 steps to improve your online security and stop hackers 10 Steps To Becoming An Elite Cyber Security Pro Hacker Full Ethical Hacking Course – Network Penetration Testing for Beginners Subscribe to DISC InfoSec blog by Email

Leave a Comment

Cyber Security Planning Guide

Cyber Security Planning Guide Open a PDF file The best practice guide for an effective infoSec function. Guide to Developing a Cybersecurity Strategy & Roadmap Subscribe to DISC InfoSec blog by Email

Leave a Comment