The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if they’re not based there. Source link
Election securitySecuring Americans’ votesPublished 14 September 2018To protect the integrity and security of U.S. elections, all local, state, and federal elections should be conducted using human-readable paper ballots by the...
Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they...
The Schneider Electric PowerLogic PM5560 and Modicon M221 are both susceptible to attack via an array of high-severity flaws. Source link
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution. Source link
Hours after researchers publicly disclosed an app that was caught stealing and uploading browser history data, Apple removed it from the Mac App Store. Source link
The infosec community say California's IoT security bill is "nice," but doesn't hit on the important issues. Source link
A threat actor been spotted on a number of honeypots looking to download and execute malicious cryptomining malware. Source link
An advanced threat actor has been associated with China’s Ministry of State Security via two individuals and a Chinese firm. Source link
CybersecurityDojo by BullGuard establishes lab at [email protected] Published 14 September 2018Dojo by BullGuard, an Internet of Things (IoT) security specialist, and BGN Technologies, the technology transfer company of Ben-Gurion University...