Data Breach Affects 63 Landry’s Restaurants

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source: https://threatpost.com

January 2, 2020
Read More >>

Alert overload is burning out security analysts

Survey suggests overall volume and high rate of false problems are changing priority lists in security operations centers. Alert overload is changing the work focus in security operations centers and increasing the risk of burnout among analysts, according to a survey by CriticalStart. Forty-one percent of survey respondents said the main responsibility of their job was analyzing and remediating security threats, down dramatically from 70% in the 2018 survey. Here’s…

January 2, 2020
Read More >>

Cisco DCNM Users Warned of Serious Vulnerabilities

Cisco on Thursday informed customers that it has released software updates for its Data Center Network Manager (DCNM) product to address several critical and high-severity vulnerabilities. All of the serious vulnerabilities patched in DCNM were reported to Cisco by researcher Steven Seeley of Source Incite. The flaws were reported by Seeley through Trend Micro’s Zero Day Initiative (ZDI) and Accenture’s iDefense service. Cisco has published a total of six advisories…

January 2, 2020
Read More >>

3 security tips to protect yourself from skimming attacks

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice. More about cybersecurity TechRepublic’s Karen Roby talks with Aanand Krishnan, founder and CEO of Tala Security, about protecting consumers’ identity while shopping online. The following is an edited transcript of their interview. Aanand Krishnan: I think identity theft is becoming, unfortunately, top of…

January 2, 2020
Read More >>

Critical Vulnerabilities Impact Ruckus Wi-Fi Routers

Multiple critical vulnerabilities in Ruckus Wi-Fi routers used throughout the world were disclosed at the 36th Chaos Communication Congress (CCC) in Leipzig, Germany, held from December 27-30, 2019. Ruckus offers high-end wirelesss networking gear that provides mesh Wi-Fi (called ‘Unleashed’) and regular routers to hundreds of thousands of customers. The mesh Wi-Fi is common in conferences (it was used at Black Hat last year), airports, hotels and other large areas that…

January 2, 2020
Read More >>

Hacking is… (A definition of Hacking From a Hacker’s Perspective)

“Hacking is satisfying one’s curiosity. Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. Hacking is pushing technology to its limits and making technology more resilient through testing, tinkering, and exploration. Hacking is a mindset, a culture, a spirit, and the execution of creative problem-solving. Hacking is survival by [self]-learning as knowledge is the key…

January 2, 2020
Read More >>