article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

The most concerning of these appears to be CVE-2020-1380 , which is a weaknesses in Internet Explorer that could result in system compromise just by browsing with IE to a hacked or malicious website. More information on CVE-2020-1337, including a video demonstration of a proof-of-concept exploit, is available here.

Backups 363
article thumbnail

2020 Was a Secure Election

Schneier on Security

Over at Lawfare: “ 2020 Is An Election Security Success Story (So Far).” ” What’s more, the voting itself was remarkably smooth. It was only a few months ago that professionals and analysts who monitor election administration were alarmed at how badly unprepared the country was for voting during a pandemic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elpaco Ransomware: A New Threat Actor Leverages CVE-2020-1472 for Global Attacks

Penetration Testing

This advanced malware exhibits a plethora of customization... The post Elpaco Ransomware: A New Threat Actor Leverages CVE-2020-1472 for Global Attacks appeared first on Cybersecurity News.

article thumbnail

Brazilian citizen charged for threatening to release data stolen from a company in 2020

Security Affairs

charges for allegedly threatening to release data stolen from a company in a March 2020 security breach. government has charged the Brazilian citizen Junior Barros De Oliveira, 29, with allegedly threatening to release data stolen from a company during a March 2020 security breach. A Brazilian citizen faces U.S. Sellinger announced.”

Hacking 65
article thumbnail

Monetization Monitor: Monetization Models and Pricing 2020

Customers demand—and suppliers offer—a diverse mix of monetization models for Software and Digital Services related to IoT Devices. However, many suppliers still struggle to get a full view of what’s being used by customers, what is owed to the vendors, and how a product is being used across the customer’s business.

article thumbnail

CVE-2020-12271 Exploited: FBI Seeks Chinese Hacker Behind 81,000 Device Breach

Penetration Testing

for his alleged role in... The post CVE-2020-12271 Exploited: FBI Seeks Chinese Hacker Behind 81,000 Device Breach appeared first on Cybersecurity News. The US Department of Justice announced the unsealing of an indictment against Guan Tianfeng, a Chinese national associated with Sichuan Silence Information Technology Co.

article thumbnail

Linux-Targeted Malware Increased by 35%

Schneier on Security

Crowdstrike is reporting that malware targeting Linux has increased considerably in 2021: Malware targeting Linux systems increased by 35% in 2021 compared to 2020. Ten times more Mozi malware samples were observed in 2021 compared to 2020. Lots of details in the report.

Malware 339
article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Revenera’s 2020 Software Monetization and Pricing survey gathers input from leading software companies and provides you with key insights. Yet many software suppliers still struggle to get accurate insights into usage. Top findings include: Growing Interest in Usage Data.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this webinar, you'll be provided with a clear overview of the Anti-Money Laundering Act of 2020 (AMLA), which also includes the Corporate Transparency Act (CTA). The AMLA represents the most significant changes in U.S. anti-money laundering laws since the USA PATRIOT Act of 2001.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue.