BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Essential IIoT Security Trends for 2020

view counter
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments. But the change comes...
Continue reading
  0 Comments
0 Comments

Google Makes DNS Over HTTPS Generally Available

view counter
Google this week announced the general availability of its standard DNS over HTTPS (DoH) service, which includes full RFC 8484 support. The DoH protocol is meant for sending DNS queries and...
Continue reading
  0 Comments
0 Comments

2nd Florida City Pays Hackers, as 3rd City Faces Breach

view counter
A second small Florida city this month has paid hundreds of thousands of dollars to hackers who took over most of its computer operations, an official said Wednesday, while a third...
Continue reading
  0 Comments
0 Comments

Hackers Steal Millions from Cryptocurrency Exchange Bitrue

view counter
Singapore-based cryptocurrency exchange Bitrue revealed on Thursday that hackers managed to access and move the funds of tens of its customers. In a statement posted on Twitter, the company said the...
Continue reading
  0 Comments
0 Comments

Chrome OS 75 Adds More Mitigations for Intel MDS Flaws

view counter
Chrome OS version 75, which Google released on Wednesday in the stable channel, adds more mitigations for recently disclosed Microarchitectural Data Sampling (MDS) vulnerabilities affecting most Intel processors made in the...
Continue reading
  0 Comments
0 Comments

Critical Flaws Found in Cisco Data Center Network Manager

view counter
Cisco on Wednesday informed customers that its Data Center Network Manager (DCNM) product is affected by several vulnerabilities, including ones described as “critical” and “high severity.” According to Cisco, the web-based...
Continue reading
  0 Comments
0 Comments

French Consumer Group Launches Class Action Against Google

view counter
A French consumer rights group said Wednesday that it has launched a class action lawsuit against US tech giant Google for violating the EU's strict data privacy laws. The UFC-Que Choisir...
Continue reading
  0 Comments
0 Comments

US Cyber Attack on Iran Shrouded in Digital 'Fog of War'

US vs Iran cyberwar
view counter
A claim by US officials that a retaliatory cyber attack ordered by the White House crippled Iranian missile launching systems will remain almost impossible to substantiate, experts say. Citing unnamed sources,...
Continue reading
  0 Comments
0 Comments

Email Security Firm GreatHorn Raises $13 Million

view counter
Waltham, MA-based email security firm GreatHorn has raised an additional $13 million in a new funding round technically filed as a Series A-1. The round was co-led by new investor RRE...
Continue reading
  0 Comments
0 Comments

Vulnerability Remediation Firm Vulcan Cyber Raises $10 Million

Vulcan Cyber
view counter
Vulcan Cyber, an Israel-based startup that specializes in vulnerability remediation solutions, on Wednesday announced that it raised $10 million in a Series A funding round. The investment, obtained from Ten Eleven...
Continue reading
  0 Comments
0 Comments

Presidential Phone Alerts Can Be Spoofed, Researchers Say

view counter
Presidential Alerts that all modern cell phones in the United States are required to receive and display as part of the Wireless Emergency Alert (WEA) program can be spoofed, researchers have...
Continue reading
  0 Comments
0 Comments

Six Arrested in $27 Million Cryptocurrency Theft

view counter
European authorities this week announced the arrest of 6 individuals in connection with a €24 million ($27.2 million) cryptocurrency theft. Five men and one woman were arrested in simultaneous warrants at...
Continue reading
  0 Comments
0 Comments

Swimming Upstream: What the Salmon Run Teaches Us About Security

Infosec Lessons from the Salmon Run
view counter
A Successful Security Organization Knows to be on the Lookout for Predators and to Navigate the Troubled Waters Around Them There are certain natural phenomena that I find to be simply...
Continue reading
  0 Comments
0 Comments

Google Allows G Suite Users to Log In With Security Codes

Security keys
G Suite security code
view counter
Google on Tuesday announced that G Suite users can now log in on platforms that don’t directly support security keys using security codes generated by their security keys. Security keys, which...
Continue reading
  0 Comments
0 Comments

EA Games Login Flaw Exposed Accounts of 300 Million Gamers

view counter
Researchers have discovered a chain of flaws in EA Games' login process that could allow an attacker to take over the accounts of any or multiple EA gamers -- and there...
Continue reading
  0 Comments
0 Comments

AWS Launches Mirroring Feature for Inspecting Network Traffic

AWS launches VPC Traffic Mirroring
view counter
Amazon Web Services (AWS) on Tuesday announced the launch of VPC Traffic Mirroring, a new feature that allows users to capture and inspect network traffic from their Amazon EC2 instances. Until...
Continue reading
  0 Comments
0 Comments

Senate Report Shows Decade-Long Failure of Gov Agencies to Protect Personal Data

view counter
A new report from the U.S. Senate’s Committee on Homeland Security and Governmental Affairs has revealed the decade-long failure of several important federal agencies to secure their systems and protect sensitive...
Continue reading
  0 Comments
0 Comments

Instagram Chief Insists It Doesn't Spy on Users

view counter
Instagram doesn't snoop on private conversations as part of its advertising targeting strategy, the head of the popular social media site said in an interview Tuesday. "We don't look at your...
Continue reading
  0 Comments
0 Comments

AWS Announces General Availability of Security Hub

AWS launches Security Hub
view counter
Amazon Web Services (AWS) on Tuesday announced the general availability of Security Hub, a service that aggregates and prioritizes alerts from AWS and many third-party security tools. Security Hub was unveiled...
Continue reading
  0 Comments
0 Comments

Hackers Favoring Shimmers Over Skimmers for ATM Attacks

view counter
Cybercriminals are increasingly using shimmers instead of skimmers in attacks targeting automated teller machines, Flashpoint reports.  Skimmers are small devices nearly indistinguishable from legitimate card readers, which have been designed to...
Continue reading
  0 Comments
0 Comments