Cisco Fixes High-Risk Vulnerabilities in Some Small Business RV Series Routers

A number of Cisco Small Business RV Series Routers series were found to be vulnerable to a couple of attacks, and Cisco was quick to explain what the vulnerabilities were and that the patches were issued. Cisco confirmed that command injection and arbi… Continue reading Cisco Fixes High-Risk Vulnerabilities in Some Small Business RV Series Routers

Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows

The lack of certified cybersecurity professionals is felt throughout the world, and the industry would need to more than double the number of staff to meet the market’s needs, according to a study by (ISC)². As it stands, the supply of … Continue reading Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows

Original Google Pixel to Get the Last Update this December

The first generation of Google Pixel devices has finally reached the end of life, and one last security patch will arrive in December. Starting with 2020, any new vulnerability found with these phones (or the OS they run) won’t be fixed or even a… Continue reading Original Google Pixel to Get the Last Update this December

Phishing Campaigns Boosting Success with Google Analytics

Cybercriminals behind phishing campaigns are using Google analytics for their websites, enabling attackers to gather relevant data that can boost their success, an Akamai study found. Phishing kit developers have integrated web analytics into the softw… Continue reading Phishing Campaigns Boosting Success with Google Analytics

Six Times More Data Breaches Reported in Canada after Disclosure Rules Tightened

The number of reported data breaches in Canada increased six-fold after the country implemented new breach-reporting regulations under a federal private sector privacy law. Amendments introduced last year to the 19-year-old federal Personal Information… Continue reading Six Times More Data Breaches Reported in Canada after Disclosure Rules Tightened

Transparent Cybersecurity Policies Make Companies More Attractive to Investors

Companies that are transparent about their cybersecurity risk management efforts are more attractive to investors, after or before a data breach happens in their industry.
The post Transparent Cybersecurity Policies Make Companies More Attractive … Continue reading Transparent Cybersecurity Policies Make Companies More Attractive to Investors

Researchers Find SMS Monitoring Malware in Linux Telecom Servers

A state-sponsored tool most likely used by Chinese advanced persistent threat group APT41 was discovered inside the Linux servers of an undisclosed telecom company, surveilling incoming and outgoing SMS messages. FireEye Mandiant recently identified a … Continue reading Researchers Find SMS Monitoring Malware in Linux Telecom Servers