Forwarded from Start X (ex-Антифишинг)
Добро пожаловать в открытый канал Антифишинга.
Здесь мы публикуем анонсы наших дайджестов, собственные исследования по психологии в безопасности, новости про фишинг и прочие цифровые атаки на людей, а также другие материалы, которые помогут вам, вашим коллегам и близким оставаться в безопасности.
www.antiphish.ru
blog.antiphish.ru
Классификация цифровых атак: www.antiphish.ru/classification
Стадии цифровой атаки: www.antiphish.ru/stages
Здесь мы публикуем анонсы наших дайджестов, собственные исследования по психологии в безопасности, новости про фишинг и прочие цифровые атаки на людей, а также другие материалы, которые помогут вам, вашим коллегам и близким оставаться в безопасности.
www.antiphish.ru
blog.antiphish.ru
Классификация цифровых атак: www.antiphish.ru/classification
Стадии цифровой атаки: www.antiphish.ru/stages
www.antiphish.ru
Антифишинг стадии цифровой атаки на человека
Антифишинг классификация цифровых атак на сотрудников
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
О том, как нужно делать аудит кибербезопасности АСУ ТП: обзор методологии оценки рисков кибербезопасности aeCyberPHA от компании aeSolutions
https://www.youtube.com/watch?v=CjgN-RqdTJI
https://www.youtube.com/watch?v=CjgN-RqdTJI
YouTube
aeCyberPHA® Cyber Risk Assessment Methodology
aeSolutions offers industrial control system (ICS) cybersecurity risk assessment services in every phase of the process automation/process safety lifecycle. ...
👍1
ACMA mandates stronger identity checks when porting Australian mobile numbers | ZDNet
https://www.zdnet.com/article/acma-mandates-stronger-identity-checks-when-porting-australian-mobile-numbers/
https://www.zdnet.com/article/acma-mandates-stronger-identity-checks-when-porting-australian-mobile-numbers/
ZDNet
ACMA mandates stronger identity checks when porting Australian mobile numbers
From April, customers will need to authorise transfers with their telco.
Responses to catastrophic artificial general intelligence (AGI) risk: a survey
https://iopscience.iop.org/article/10.1088/0031-8949/90/1/018001
https://iopscience.iop.org/article/10.1088/0031-8949/90/1/018001
ISACA Webinar, 3rd of March: Meeting the Board’s Security, Audit and Compliance Demands
https://www.isaca.org/education/online-events/lms_w030320?cid=sm_2003367
https://www.isaca.org/education/online-events/lms_w030320?cid=sm_2003367
Cybersecurity: Poised for a giant leap forward | SC Media
https://www.scmagazine.com/home/security-news/ransomware/poised-for-a-giant-leap-forward/
https://www.scmagazine.com/home/security-news/ransomware/poised-for-a-giant-leap-forward/
SC Media
Cybersecurity: Poised for a giant leap forward | SC Media
Cybersecurity has enjoyed good health but is the industry itching for innovation and transformation – and the next big thing?
Follow the cybersecurity money | SC Media
https://www.scmagazine.com/home/security-news/features/follow-the-cybersecurity-money/
https://www.scmagazine.com/home/security-news/features/follow-the-cybersecurity-money/
SC Media
Follow the cybersecurity money | SC Media
Venture capitalists have poured money into cybersecurity in recent years – their investments offer a glimpse at what products, solutions and startups are
RDP - the most exploitable by ransomeware protocol in the last 3 quarters.
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
https://www.zdnet.com/article/fbi-ransomware-victims-have-paid-out-140-million-one-version-has-cost-them-the-most/
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
https://www.zdnet.com/article/fbi-ransomware-victims-have-paid-out-140-million-one-version-has-cost-them-the-most/
ZDNet
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
Over six-and-a-half years, ransomware victims have handed over vast amounts of bitcoin to crooks. Some variants of the malware have generated more ransom than others.
'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
https://www.zdnet.com/article/malware-free-attacks-now-most-popular-tactic-amongst-cybercriminals/
https://www.zdnet.com/article/malware-free-attacks-now-most-popular-tactic-amongst-cybercriminals/
ZDNet
'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
Malware-free or fileless techniques accounted for 51% of attacks last year, compared to 40% the year before, as hackers turn to stolen credentials to breach corporate networks, reveals CrowdStrike's latest threat report.
Global Threat Report 2020: Foreword from George Kurtz | CrowdStrike
https://www.crowdstrike.com/blog/global-threat-report-foreword-2020/
https://www.crowdstrike.com/blog/global-threat-report-foreword-2020/
crowdstrike.com
Global Threat Report 2020: Foreword from George Kurtz | CrowdStrike
Read the foreword of the 2020 Global Threat Report from CrowdStrike CEO and Co-Founder George Kurtz, and download your copy of the annual threat report.
Forwarded from Alexey Lukatsky
Презентации с ICS Security Summit выложили - https://www.sans.org/cyber-security-summit/archives/ics
www.sans.org
SANS Institute: Summit Archives
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
CWE list now includes hardware security weaknesses - Help Net Security
https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/
https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/
Help Net Security
CWE list now includes hardware security weaknesses - Help Net Security
The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration list, which has been expanded to include hardware security weaknesses.