IBM: From Bad To Worse, Ransomeware Destructive Malware Attacks Have Doubled
via Camille Singleton, writing at SecurityIntelligence, details a report (you will need to create an IBMID. Saving grace: it's free) issued by IBM's XForce, illuminating the rapid increase of Wiper-type destructuve ransomeware attacks. Read It and Weep.
"Destructive malware that disables access to data or destroys system functions has been expanding across geographies and industries over the past few years. Organizations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly." via the IBM XSS IRIS Report" Combating Destructive Malware - Lessons From The Front Lines"
OWASP Appsec Tel Aviv 2019, Ovidiu Cical's 'Automated Cyber Security Platform At Scale' →
OWASP Appsec Tel Aviv 2019, Lewis Ardern's 'OWASP Top 10 For JavaScript Developers' →
Apple Suspends Human Surveillance of Siri Queries
The key word here, folks, is 'Suspends'. Apple Inc. (Nasdaq: AAPL) will re-enable the activity. But it's only for your own good... Right?
OWASP Appsec Tel Aviv 2019, Michal Braverman-Blumenstyk's 'The Importance Of The Cloud And The Developers Communities In Fighting Cyber Crime' →
OWASP Appsec Tel Aviv 2019, Kevin Cody's 'Dissecting Mobile Application Privacy And Analytics' →
OWASP Appsec Tel Aviv 2019, Katy Anton's 'Injecting Security Controls In Software Applications' →
OWASP Appsec Tel Aviv 2019, Tomer Zait's & Maxim Zavodchik's 'Webhooks Hookups Abusing API Developers' →
OWASP Appsec Tel Aviv 2019, Tin Zaw's 'Uninvited Guests: Understanding Malicious Web Bots With OWASP Handbook' →
OWASP Appsec Tel Aviv 2019, Krzysztof Kotowicz' & Mike Samuel's 'Trusted Types: End To End Injection Safety At Scale' →
working on the Information Security Engineering Team at Google Inc.
Mike Samuel is a Software Engineer,
working on the Technical Infrastructure Team at Google, Inc.
United States Army Cyber Command Announces Release of DOD Identity Awareness and Protection Management Guide
via the hardest working editor in the Information Security/Cyber Security/Physical Security space - William Knowles - the Senior Editor of Infosec News, comes an announcement report from the Department of the Army's U.S. Army Cyber Command in which, the publication of the DoD Identity Awareness and Protection Management Guide has been made generally available for public download.
"The IAPM Guide is divided into two-page chapters detailing key privacy considerations on the most popular online services, mobile apps, and consumer devices available in the market today. Each chapter provides you with tools, recommendations, and step-by-step guides to implement settings that maximize your security. The guide is updated twice a year, in March and September." - via William Knowles, Senior Editor of Infosec News and the U.S. Department of Defense's Department of the Army's, U.S. Army Cyber Command on the release of the IAPM Guide.
OWASP Appsec Tel Aviv 2019, Inon Shkedy's 'Testing And Hacking APIs' →
OWASP Appsec Tel Aviv 2019, Itsik Mantin's & Ori Or-Meir's 'How NLP Can Help Us Understand Web Attackers' →
OWASP Appsec Tel Aviv 2019, Geoffrey Hill's 'Bringing Rapid Prototyping To The Threat Model Process' →
OWASP Appsec Tel Aviv 2019, Aaron Guzman's 'Vehicle Security Trends & Implications For Automotive Suppliers' →
Aaron Guzman is a Director with Aon’s Cyber Solutions Group, also serving as Head of Automotive & IoT Testing.