Cyber Security News

February 2020

331.

Hackers Could Shut Down Satellites - Or Turn Them Into Weapons

332.

Government Revs Up IT Security Automation

333.

Hackers Could Shut Down Satellites - Or Turn Them Into Weapons

334.

Spy Court Won't Declassify Opinions on Gov't Data Collection

335.

EU Watchdog Mulls Cyber Attack Database for Insurers



336.

CDC and WHO's Coronavirus Data, Visualised From a Blockchain

337.

In Coronavirus, $45-Billion Cruise Industry Faces a Big Challenge

338.

Britain to Create Regulator for Internet Content

339.

KBOT Malware Shows Viruses Are Not Extinct

340.

Emotet Evolving to Exploit Coronavirus Fear


Tick Tock. Tick Tock. Did you get hacked?


341.

Internet Explorer Zero Day Among 99 Patch Tuesday Problems

342.

Bad Security Practices Meet China's Captain America: the OPM Hack Explained

343.

Me and My Shadow: Equifax/Chinese Spies

344.

US Charges Chinese Military Officers Over Equifax Hack

345.

US Tries to Stop Flow Of Personal Data to China with Charges



346.

US Charges Four Members Of Chinese Military Over Hacking Personal Data Of Millions

347.

Abode's Cheap DIY Home Security Kit Adds HomeKit

348.

Coronavirus Could Cut China's Smartphones Sales in Half This Quarter

349.

Estée Lauder Exposes 440 Million Records in Unprotected Database: Beauty and the Breach

350.

US, German Spies Plundered Global Secrets Via Swiss Encryption Firm


Outwitting malicious attackers? Get in touch.


351.

China Denies US Allegations Over Military 'Hackers'

352.

Jenkins Servers Can Be Abused for DDoS Attacks

353.

Mac Malware Is Growing Fast. But It's Still Not as Dangerous as the Attacks on Windows

354.

Emotet Trojan Evolves to Spread Via WiFi Connections

355.

KBOT Virus Takes Out System Files with No Hope Of Recovery



356.

IoT Security Is Bad. It's Time to Take a Different Approach

357.

Automaton Takes Center Stage in Enterprise Cyber Attacks

358.

Malware Metamorfo Will Make You Retype Credentials to Raid Your Bank Account

359.

This Phishing Scam Uses Fake Invoices to Target Your Data: Malware

360.

Ad Groups Want Lawsuit Threat Cut From Wash. Privacy Bill

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you