Cyber Security News

June 2019

331.

Singapore Faced Fewer Cyber Threats in 2018

332.

Update Your Firefox Browser, Hackers Are Abusing a Serious Bug

333.

Modular Backdoor Can Spread Over Local Network

334.

A Cyber Security Labor Shortage

335.

Hacking Group Probes US Power Networks for Entry Points


What's the worst that could happen?
(Hint: Your trade secrets could be stolen...)


336.

Cyber Weaknesses That Led to Breaches at NASA's JPL Persist, Says IG

337.

Canada Approves Expansion Of Controversial Trans Mountain Pipeline

338.

Canada Approves Expansion Of Controversial Trans Mountain Pipeline

339.

Russia's Power Grid Is an Easy Target for US Hacking

340.

Cyber Weaknesses That Led to Breaches at NASA's JPL Persist, Says IG


What's the worst that could happen?


341.

Polymorphic Phishing Attacks Now Make Up Almost Half Of All Phishing Attempts

342.

House Homeland Security Republicans to Introduce Slew Of Cyber Security Bills

343.

Senators Weigh Potential Security Risks From Chinese-made Drones

344.

The Top Six Cloud Security Threats to Know About in 2019

345.

What Does Runtime Container Security Really Mean?


Did the bad guys just breach your network perimeter?


346.

Human Error Still the Cause Of Many Data Breaches

347.

Mirai Offspring "Echobot" Uses 26 Different Exploits

348.

Android Apps Target Bitcoin, By-Passing 2FA

349.

DHS Issues Alert for Windows 'Bluekeep' Vulnerability

350.

Australian Catholic University Phished with Staff Accounts and Systems Compromised


Outfoxing the bad guys? Let's talk.


351.

New Free Decryption Tool Allows Victims to Unlock All Versions Of This Ransomware: Game Over for GandCrab

352.

Equifax Breach Impacted the Online ID Verification Process at Many US Govt Agencies

353.

DDoS Attack Against Telegram Messaging App Came From China

354.

New Echobot Malware Is a Smorgasbord Of Vulnerabilities

355.

Oregon State University Breach Exposed Student, Family Data



356.

Mermaids Transgender Charity Data Breach Exposed Confidential Emails

357.

Prepare Now for Intent-based Networking

358.

Privacy Enhancing Technology for Data Analysis

359.

Prepare Now for Intent-based Networking

360.

Privacy Enhancing Technology for Data Analysis

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you