E6F5 4D49 5B3F 4783 DEF1 1494 6199 BFDA 457D 1C5F

  1. Brace for more cybercrime as you work from home, experts warn [Carin Smith, fin24]
  2. Distributed disruption: Coronavirus multiplies the risk of severe cyberattacks [Marc Wilczek, Link11 / Help Net Security]
    - see also: Catching the Virus Cybercrime, Disinformation and the COVID-19 Pandemic
  3. Microsoft: How one Emotet infection took out this organization’s entire network [Liam Tung, Zero Day]
    - see also: This Is Not Your Father’s Ransomware
    - and: 5 Ways Enterprises Inadvertently Compromise Their Network Security
  4. Threat actor selling access to a Canadian university’s domain [Howard Solomon, IT World Canada]
    - see also: University of Warwick hiding data security risks from students and staff
  5. This is how you deal with route leaks [Radar by Qrator]
    - see also: Not just another BGP Hijack
    - and: Internet Society Expands Program for Secure Internet Routing Framework
  6. Zoom banned from New York City schools due to privacy and security flaws [Ainsley Harris, Fast Company / Mansueto Ventures]
    - see also: How to block ‘Zoom bombing’ in higher ed
    - and: The internet is now rife with places where you can organize Zoom-bombing raids
    - and Move Fast and Roll Your Own Crypto
    - and: ‘War Dialing’ Tool Exposes Zoom’s Password Problems
  7. Top Email Protections Fail in Latest COVID-19 Phishing Campaign [Elizabeth Montalbano, Threatpost]
    - see also: Threat Actors Evade Proofpoint and Microsoft 365 ATP Protection to Capitalize on COVID-19 Fears
    - and: Why Humans Are Phishing’s Weakest Link
  8. Active Directory Attacks Hit the Mainstream [Jason Crabtree, Dark Reading]
    - see also: Kerberos Tickets on Linux Red Teams
  9. NATO Report Warns of New Authoritarian Chinese Splinternet [Phil Muncaster, Infosecurity Magazine / Reed Exhibitions]
  10. The Zero Trust Learning Curve: Deploying Zero Trust One Step at a Time [John Kindervag, Palo Alto Networks]
    - see also: Implementing a Zero Trust Architecture
    - and: Take the Zero Trust Assessment and see where you are in your journey
  11. Offense and Defense – A Tale of Two Sides: Bypass UAC [Anthony Giandomenico, Fortinet]