Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cyber war meets real war.

Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First

And from Bruce Schneier and Wired.


Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released security updates to address a remote code execution vulnerability in the following in-support and out-of-support operating systems:

  • In-support systems: Windows 7, Windows Server 2008 R2, and Windows Server 2008
  • Out-of-support systems: Windows 2003 and Windows XP!!

A remote attacker could exploit this vulnerability to take control of an affected system. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Microsoft Security Advisory and Microsoft Customer Guidance for CVE-2019-0708 and apply the necessary updates.


What is the Difference Between Artificial Intelligence, Deep Learning, and Machine Learning?

Artificial Intelligence has become one of the most overused buzzwords in the cybersecurity field. Cybersecurity buzzwords gain more traction as the world of cybersecurity becomes more omnipresent in our cultural consciousness.


Blockchain: Top 4 challenges CIOs face

With hype around blockchain fading, organizations are starting to seek out use cases for the technology, according to Gartner.


What is form-jacking?

Scammers are always thinking of new ways to steal your personal information, and now they’re employing a new trick: Form-jacking.  Form-jacking places a virus on a commercial website to steal your information as you’re making a legitimate transaction. Learn how it works and how you can prevent it.


Government spyware hidden in Google Play store apps

The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.


TP-Link router zero-day that offers your network up to hackers

Downgrade attack lets any user take over – just ask for old-style access to the debugging port and you won’t need a password.


Are there viable alternatives to Facebook and Twitter?

There’s growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.


Microsoft slaps down Iranian Cyber Army by taking down 99 APT35/Charming Kitten domains

Court order in hand, Microsoft seized control of the hacker group’s (which it calls Phosphorous) phishing sites.


 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an instruction for CompTIA’s non-profit IT-Ready Program in the Twin Cities. IT-Ready is a tuition free 8-week program designed to teach students of all ages the fundamentals of IT support to prepare them for an entry level position in Information Technology Support. Graduates of the classes take the exams to become CompTIA A+ certified. Bob is a frequent speaker at conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.