- Zim hacker granted bail to attend Swiss hackathon [Samuel Mungadze, IT Web]
-
Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security [Sergiu Gatlan, Bleeping Computer]
- see also: Firms Improve Threat Detection but Face Increasingly Disruptive Attacks - 8.4 million: Number of DDoS attacks researchers saw last year alone [Help Net Security]
- 5 Strategies to Secure Cloud Operations Against Today’s Cyber Threats [Chris Christou and Brad Beaulieu, Dark Reading]
- Admins beware! Microsoft gives heads-up for ‘disruptive’ changes to authentication in Office 365 email service [Tim Anderson, The Register]
-
Are CISOs ready for zero trust architectures? [Vladimir Jirasek, Foresight Cyber / Help Net Security]
- see also: To Rank or Not to Rank Should Never Be a Question - Top 10 web hacking techniques of 2019 [James Kettle, PortSwigger Research]
- Whodat? Enumerating Who “owns” a Workstation for IR [Rob VandenBrink, SANS ISC]
- The Ecosystem of Phishing: From Minnows to Marlins [Photon Research Team / Digital Shadows]
-
Up close and personal with Linux malware [Tomáš Foltýn, WeLiveSecurity / ESET]
- see also: The Linux Foundation identifies most important open-source software components and their problems - Cybersecurity alliance launches first open source messaging framework for security tools [Charlie Osborne, Zero Day]
- New Mozart Malware Gets Commands, Hides Traffic Using DNS [Lawrence Abrams, Bleeping Computer]
- Is your phone listening to you? [Jake Moore, WeLiveSecurity / ESET]]
- Data Encryption on Android with Jetpack Security [Jon Markoff, Google Security Blog]
- Jon Callas: Encryption is a technology that rearranges power [Mirko Zorz, Help Net Security]
C410 A2BE CB73 EF77 746E 9682 E2C4 91CE D20D 800F