- Higher Education
- ‘I came home and burst into tears’: How Dundee and Angus College boss built back better after cybercriminals demanded entire college bank balance [Peter John Meiklem, The Courier / DC Thomson Media]
- Budget
- 3 Steps CISOs Can Take to Convey Strategy for Budget Presentations [Vinay Sridhara, Dark Reading / Informa]
- Social Engineering / Awareness
- GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services [Brian Krebs]
- Security Culture: Putting Digital Literacy First in Your Company [Mike Elgan, Security Intelligence / IBM]
- Smart cars / IOT
- Tesla Model X key fobs could be hacked to steal cars, fix released [Sergiu Gatlan, Bleeping Computer]
- The smart video doorbells letting hackers into your home [Martin Pratt, Which?]
- Webinars and trainings
- Cybersecurity training for open science research [ResearchSOC]
- Advisories / Vulnerabilities
- Multiple vulnerabilities in VMware ESXi, Workstation and Fusion [VMWare]
- 2FA bypass discovered in web hosting software cPanel [Catalin Cimpanu, Zero Day ]
- DDoS Mitigation
- DDoS Extortionist’s Behaviors [Barry Greene]
- General
- Even the world’s freest countries aren’t safe from internet censorship [Help Net Security]
- WordPress Malware Setting Up SEO Shops [Larry Cashdollar, Akamai Technologies]
- Threat Modeling Manifesto
- CIS Videoconferencing Security Guide [Center for Internet Security]
- Stop Thinking of Cybersecurity as a Problem. Think Of It As a Game. [Lou Manousos, RiskIQ]
- When Security Controls Lead to Security Issues [Xavier Mertens, ISC]
C410 A2BE CB73 EF77 746E 9682 E2C4 91CE D20D 800F