Skip to content
Monday, January 18, 2021

Ken Gilmour

Curated News Feeds

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Cyber Tools!
Home>Archive by Category SocialEngineering

Category: SocialEngineering

Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

October 27, 2020 Economic Threats Monitoring Bot13

Introduction Start your free trial I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, lookin…

Continue Reading

Low CVE-2020-24847: Fruitywifi project Fruitywifi

October 27, 2020 Auto Bot15

Description: A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering …

Continue Reading

Woolworths High-Street ‘relaunch’ proves a hoax

October 27, 2020 Auto Bot8

image caption The Metro appears to have been the first mainstream media outlet to report the fake news.

Ray Walsh, scam expert at virtual private network (VPN) company ProPrivacy, said: “It’s not unsurprising that huge numbers of people around the UK …

Continue Reading

COULD A CYBER-ATTACK ON E-VOTING SYSTEMS AFFECT THE UPCOMING US ELECTIONS?

October 27, 2020 Auto Bot7

Yes it can. With the US elections just around the corner, we thought this would be a good opportunity to talk about cybersecurity risks of election processes, as more and more elections around the world, are turning into electronic voting (or e-voting)…

Continue Reading

Targeted Attacks Part 3 – The Exploit

October 27, 2020 Cyber Crime Monitoring Bot8

Targeted Attacks Part 3 – The Exploit.

In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice Lead at T…

Continue Reading

The Connection Inc. Celebrates Cybersecurity Awareness Month With Expert Panel at Holmdel’s Bell Works. – TAPinto.net

October 27, 2020 Economic Threats Monitoring Bot7

Gaydos, a security engineer at The Connection, defined cybersecurity as “the protection of everything technological for your business.” He said that cybersecurity protects many aspects of one’s business life, from basic work statements to their website…

Continue Reading

Cyber Awareness Training a Must for Third-Party Contractors

October 27, 2020 Cyber Crime Monitoring Bot10

Many, if not most, organizations rely on outside contractors . But most may not know the threat they can pose to your network and data. According to new research from ISN, only 23% of contractors reported they require cybersecurity awareness training a…

Continue Reading

The Transformation of Business in an Age of Espionage – Lawfare

October 27, 2020 Auto Bot9

on Lawfare wrote previously , businesses are being targeted by foreign intelligence agencies seeking to boost the competitive edge of their own governments. To respond, private enterprise will need to open its aperture on intelligence threats and dig i…

Continue Reading

Elections Interference: Were We Hacked?

October 27, 2020 Cyber Crime Monitoring Bot9

Written by Dan Mandel On Wednesday, October 21, senior US national security officials alerted that Iran and Russia obtained voter data in their efforts to interfere in the upcoming US election. “This data can be used by foreign actors to attempt to com…

Continue Reading

The Growing Cybersecurity Threats and How to Address Them – Channel Futures

October 26, 2020 Auto Bot6

October is Cybersecurity Awareness Month. As the month winds down, it’s an ideal time to focus attention on a topic of utmost (and ongoing) importance for every business right now: cybersecurity threats. Statistics are showing that cyberattacks and cyb…

Continue Reading

Posts navigation

Older posts

Free SIEM tool

  • img1.jpg

Recent Articles

  • Cybersecurity tips for businesses to prepare for the next holiday period January 18, 2021
  • Cyber Threat From Electric Vehicles Cannot Be Ignored | Hacker Noon January 18, 2021
  • #ransomware | #computerhacker | LETTER: Protecting Canada’s vaccine supply against ransomware | Regional-Perspectives | Opinion January 18, 2021
  • The 9 best cyber security courses | IT PRO – IT PRO January 18, 2021
  • THREATS TO INTERNET SECURITY: TYPES AND PROTECTION METHODS January 18, 2021
  • Parler’s website re-surfaces with message from CEO John Matze to the ‘lovers and haters’ January 18, 2021
  • Private Cyber Warfare || A Dark Side of the Moon Story January 18, 2021
  • AI likely to replace humans in cybersecurity space by 2030 – The Tribune January 18, 2021
  • New coalition aims to combat growing wave of ransomware attacks | TheHill – The Hill January 18, 2021
  • Biden to Restore Homeland Security and Cybersecurity Aides to Senior White House Posts January 18, 2021

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Search

Most active Tags

APTFilter AVGNews CERT-LatestNews FSecureNews KasperskyNews Malware McAfeeNews SocialEngineering SophosNews SymantecNews ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic TrendMicroNews VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesCisco VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesMicrosoft VulnerabilitiesMozilla VulnerabilitiesNetwork VulnerabilitiesOracle VulnerabilitiesOS VulnerabilitiesVMWare VulnerabilitiesVOIP
Copyright 2020 - Ken Gilmour
  • Attribution
  • Where I work