BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Eight Arrested Over Cyberattacks Against Hong Kong Police

view counter
Hong Kong police said Wednesday they have arrested eight people for stealing and disclosing personal information of officers online, as the city grapples with the aftermath of unprecedented anti-government protests that...
Continue reading
  0 Comments
0 Comments

FTC, D-Link Reach Agreement Over Device Security

view counter
Taiwan-based networking equipment manufacturer D-Link has agreed to implement a comprehensive security program to settle accusations by the U.S. Federal Trade Commission (FTC) claiming that the company failed to implement proper...
Continue reading
  0 Comments
0 Comments

Nexus Repository Flaws Expose Thousands of Private Artifacts

view counter
Two vulnerabilities in Nexus Repository exposed thousands of private artifacts across a broad range of industries, Twistlock’s security researchers reveal. Nexus is Sonatype’s integrated open source governance platform that allows developers...
Continue reading
  0 Comments
0 Comments

Many VMware Products Affected by SACK Linux Vulnerabilities

view counter
Over 30 VMware products are affected by SACK Panic and SACK Slowness , two recently disclosed Linux kernel vulnerabilities that can be exploited remotely without authentication for denial-of-service (DoS) attacks. The...
Continue reading
  0 Comments
0 Comments

U.S. Cyber Command Warns of Outlook Flaw Exploited by Iranian Hackers

USCYBERCOM warns of attacks exploiting CVE-2017-11774
view counter
The U.S. Cyber Command (USCYBERCOM) on Tuesday warned that it had spotted attacks exploiting a Microsoft Outlook vulnerability tracked as CVE-2017-11774 in an effort to deliver malware. According to USCYBERCOM ,...
Continue reading
  0 Comments
0 Comments

Huawei Remains Blocked From US 5G: White House Trade Advisor

view counter
China's telecoms giant Huawei remains barred from the development of 5G wireless networks in the United States, a senior White House trade advisor said Tuesday. "US policy on Huawei with respect...
Continue reading
  0 Comments
0 Comments

Adware Gathers 9 Million Downloads in Google Play

view counter
A recently identified adware campaign has gathered over 9 million downloads via 111 infected applications distributed through Google Play, Trend Micro’s security researchers reveal. Discovered last month but active since 2018,...
Continue reading
  0 Comments
0 Comments

Americans Want to Protect Their Information, but Don't Know How: Survey

view counter
Americans are keen on security, but do not necessarily understand it. This is the conclusion of a new survey of 1,300 Americans undertaken by YouGov, which basically suggests that attitudes towards...
Continue reading
  0 Comments
0 Comments

Threat Actor Targets Libyans with Malware via Facebook

view counter
A threat group has been targeting mobile and desktop users in Libya with malware through Facebook pages, Check Point has discovered. The campaign, which the cybersecurity firm has dubbed Operation Tripoli, has...
Continue reading
  0 Comments
0 Comments

Bruce Schneier Moves on from IBM

view counter
Bruce Schneier announced in a brief blog post , "I'm leaving IBM." His three-year stint with what he calls "the nicely ambiguous title of 'Special Advisor'" ended at the end of...
Continue reading
  0 Comments
0 Comments

Defending Downwind as the Cyberwar Heats up

Iran Cyber Tensions
view counter
The last few weeks have seen a substantial escalation of tensions between Iran and the US as regional cyberattacks gain pace and sophistication with Iran’s downing of a US drone ,...
Continue reading
  0 Comments
0 Comments

Google Patches Critical Code Execution Bugs in Android Media Framework

view counter
This week, Google released the July 2019 set of patches for the Android operating system, to address a total of 33 vulnerabilities, including 9 rated Critical. The most severe of these...
Continue reading
  0 Comments
0 Comments

Cyberattack Forces Georgia Agency to Shut Down Websites

view counter
A Georgia state agency says a cyberattack has forced it to shut down some court websites. News outlets report hackers demanding a ransom infected computers with malware at the Georgia Administrative...
Continue reading
  0 Comments
0 Comments

Firefox Update to Address Antivirus TLS Errors

view counter
Mozilla revealed on Monday that the upcoming Firefox 68 will address TLS issues caused by antiviruses by automatically making changes to the browser’s configuration when a man-in-the-middle (MitM) error is detected....
Continue reading
  0 Comments
0 Comments

Researchers Analyze Vietnamese Hackers' Suite of RATs

view counter
BlackBerry Cylance security researchers have analyzed a suite of remote access Trojans (RATs) that the Vietnam-linked threat actor OceanLotus has been using in attacks for the past three years. Also referred...
Continue reading
  0 Comments
0 Comments

Trump Move to Ease Huawei Sanctions Sparks Anger, Confusion

view counter
The US trade war truce with China which could ease sanctions on Huawei has prompted a backlash from lawmakers over national security concerns amid confusion over how the deal may impact...
Continue reading
  0 Comments
0 Comments

Hardcoded Credentials Expose SICK Controllers to Remote Attacks

SICK controller
view counter
A researcher has discovered that remote hackers could reconfigure or disrupt MSC800 modular system controllers from Germany-based sensor maker SICK due to the existence of hardcoded credentials. The affected controllers, which...
Continue reading
  0 Comments
0 Comments

Smart Home Hacked via Vulnerabilities, Social Engineering

view counter
Hacking Smart Homes - the Stuff of Horror Movies The Smart Home is coming. In a few privileged areas, it is already here. It comprises a series of separate IoT devices...
Continue reading
  0 Comments
0 Comments

Risk-Based Vulnerability Management is a Must for Security & Compliance

view counter
Vulnerability management and compliance go hand-in-hand. Just as adhering to certain regulatory standards can help an organization manage vulnerabilities more effectively, managing vulnerabilities effectively can make an organization less susceptible to...
Continue reading
  0 Comments
0 Comments

European Legislation and the American Tech Industry

view counter
It may sound far-fetched, but American tech firms could be excused for wondering if the European Union is using consumer-oriented legislation as a form of protectionism for its smaller industry against...
Continue reading
  0 Comments
0 Comments