BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Facebook Usage Has Collapsed Since Scandals

Facebook usage has plummeted over the last year, according to data seen by the Guardian, though the company says usage by other measures continues to grow. Since April 2018, the first...
Continue reading
  0 Comments
0 Comments

Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group's Servers

image
If nation-sponsored hacking was baseball, the Russian-speaking group called Turla would not just be a Major League team—it would be a perennial playoff contender. Researchers from multiple security firms largely agree...
Continue reading
  0 Comments
0 Comments

78,0000 Prescriptions Left In Database With No Password

Heap of medical pills in white, blue and other colors. Pills in plastic package. Concept of healthcare and medicine.
HIPAA leak screenshot
HIPAA leak screenshot
Heap of medical pills in white, blue and other colors. Pills in plastic package. Concept of healthcare and medicine. Getty Images/iStockphoto A MongoDB database was left open on the internet without...
Continue reading
  0 Comments
0 Comments

Firefox Zero Day Was Used In Attack Against Coinbase Employees

Coinbase
Logo: Coinbase // Composition: ZDNet A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the...
Continue reading
  0 Comments
0 Comments

22 State Attorneys General Seek Election Security Help

22 State Attorneys General Seek Election Security Help
Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime , Governance Funding for Cybersecurity Enhancements Sought( @Ferguson_Writes ) • June 19, 2019     A group of 22 state attorneys general,...
Continue reading
  0 Comments
0 Comments

AMCA Bankruptcy Filing in Wake of Breach Reveals Impact

AMCA Bankruptcy Filing in Wake of Breach Reveals Impact
Cybercrime , Fraud Management & Cybercrime , Incident & Breach Response Court Documents Outline a 'Host of Negative Consequences'( HealthInfoSec ) • June 19, 2019     In a case underscoring...
Continue reading
  0 Comments
0 Comments

Cisco on Cybersecurity: Targeting Optimal Protection

Governance , Incident & Breach Response , IT Risk Management Mark Weir Talks Threats, Skills Development and Incident Response Priorities( euroinfosec ) • June 19, 2019     Mark Weir, director...
Continue reading
  0 Comments
0 Comments

How to Block Advanced Threats

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg( euroinfosec ) • June 19, 2019     John...
Continue reading
  0 Comments
0 Comments

NASA's JPL Seems To Be Having A Hard Time With Security

NASA Galileo Probe (Courtesy NASA/JPL-Caltech)
NASA's Jet Propulsion Lab still has "multiple IT security control weaknesses" that expose "systems and data to exploitation by cyber criminals", despite cautions earlier this year. Following up on a strongly...
Continue reading
  0 Comments
0 Comments

Iran Claims To Have Thwarted A US Cyber Espionage Operation

image

Iran is reportedly claiming that it successfully uprooted a CIA-led cyber espionage operation and arrested several U.S. spies in the process. “One of the most complicated CIA cyber espionage networks that...
Continue reading
  0 Comments
0 Comments

Oracle Patches Another Actively Exploited WebLogic 0-Day

Oracle WebLogic
Oracle released an out-of-band security update to fix a vulnerability in WebLogic servers that was being actively exploited in the real world to hijack users' systems. Attacks using this vulnerability were...
Continue reading
  0 Comments
0 Comments

John Deere's Promotional USB Drive Hijacks Your Keyboard

Tractor-maker John Deere distributed USB drives that hijacked users’ keyboards and loaded its official website onto the browser. While the John Deere USB drive didn't do anything to compromise the security...
Continue reading
  0 Comments
0 Comments

Protecting Against Automated Attacks

Cybercrime , Fraud Management & Cybercrime Dan Woods of Shape Security on How Enterprises Should Mitigate Risks( @nickster2407 ) • June 18, 2019     Dan Woods, vice president, Shape Security...
Continue reading
  0 Comments
0 Comments

The Scourge of Commodity Malware

Cybercrime , Fraud Management & Cybercrime , Malware as-a-Service Assaf Dahan of Cybereason Analyzes Techniques( @nickster2407 ) • June 18, 2019     Assaf Dahan, head of threat research, Cybereason Assaf...
Continue reading
  0 Comments
0 Comments

Securing the Software Supply Chain

Application Security , DevSecOps , Next-Generation Technologies & Secure Development Ilkka Turunen of Sonatype on Addressing Vulnerabilities( @nickster2407 ) • June 18, 2019     Ilkka Turunen, global head of solutions...
Continue reading
  0 Comments
0 Comments

Compliance in a Hybrid Environment

Standards, Regulations & Compliance Don Closser of Firemon Shares Insights on New Issues in New Era( @nickster2407 ) • June 18, 2019     Don Closser, chief product officer, Firemon How can...
Continue reading
  0 Comments
0 Comments

A CISO's Insights on Breach Detection

) • June 18, 2019     10 Minutes    Implementing new technologies and best practices can help healthcare organizations dramatically improve their detection of data breaches, says Mitch Parker, CISO...
Continue reading
  0 Comments
0 Comments

'Extreme But Plausible' Cyberthreats

) • June 18, 2019     10 Minutes    A new report from Accenture highlights five key areas where cyberthreats in the financial services sector will evolve. Many of these...
Continue reading
  0 Comments
0 Comments

Charlotte Leaders Focus on Third-Party Risk

) • June 17, 2019     10 Minutes    Third-party risk has emerged as one of 2019's top security challenges, and the topic was the focus of a recent roundtable...
Continue reading
  0 Comments
0 Comments

Reinventing Security Awareness Training

Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton. A good place to start:...
Continue reading
  0 Comments
0 Comments