Threat Intelligence

Sponsored
by

Noteworthy

WHOIS History API: Powering Domain Investigations

Reverse WHOIS: A Powerful Process in Cybersecurity

Domain Research and Monitoring: Keeping an Eye on the Web for You

Threat Intelligence / News Briefs

Kaspersky Loses Appeal Against US Government Ban of Its Security Software

A federal appeals court in Washington, D.C. has upheld the federal government’s ban on anti-virus software from the Russian cybersecurity firm Kaspersky Lab.

NTIA Releases Cybersecurity Road Map for “Building a More Resilient Internet”

U.S. Departments of Commerce and Homeland Security have released a road map setting out steps to stop the cyber threat to nations internet infrastructure, announced NTIA.

Half of Phishing Sites in the Wild Have SSL Certificates and Show Padlock Security Icon, Study Finds

A new study by anti-phishing company PhishLabs reveals 49 percent of all phishing sites in the third quarter of 2018 had Secure Sockets Layer or SSL with HTTPS in their URL.

Japan’s Cybersecurity Minister Admits He Does Not Use Computers and Not Familiar With Cybersecurity

Japan's cybersecurity minister, Yoshitaka Sakurada, 68, who recently stated he doesn't use a computer, also admitted on Thursday to a parliamentary committee that he's not very familiar with the whole cybersecurity field.

US, Russia and China Stay Out of Paris International Cybersecurity Pact

US, China and Russia have refused to sign the French-backed agreement, Paris Call for Trust and Security in Cyberspace, announced by French President at the UNESCO Internet Governance Forum (IGF) on Monday.

Schneier: Lasting IoT Security Will Only Happen if Governments Start Introducing Stiff Penalties

Without regulation, there is little hope companies will implement proper security protection measures for IoT devices, said author and security expert Bruce Schneier, during a panel discussion at the Aspen Cyber Summit.

US Copyright Office Expands Security Researchers’ Ability to Hack Without Going to Jail

The Librarian of Congress and US Copyright Office has updated the Digital Millennium Copyright Act extending some essential exemptions ensuring that computer security researchers won't be treated like nefarious criminals for their contributions to society.

Yahoo Agrees to Pay $50M and Other Costs for the Massive Security Breach Disclosed in 2016

Yahoo today announced it has agreed to pay $50 million in damages and will offer two years of free credit-monitoring services to 200 million people whose email addresses and other personal information were stolen as part of the massive security breach.

Easy Access to ICANN, IP Address Data Beats Info on Encrypted Data, Says Telstra Cybersecurity Head

When it comes to fighting cybercrime, "being able to easily access ICANN and look up IP addresses is a lot more important than accessing the minutiae of encrypted data communications," says Jacqueline McNamara, head of cybersecurity at Telstra.

Most Government Domains in the US Have Adopted Email Authentication Program to Prevent Fake Emails

According to reports, the majority of the U.S. federal domains have met the deadline to adopt an email authentication program to prevent fake emails from being sent.

Most Cyberattacks Are From Hostile States, Reports U.K.‘s National Cyber Security Centre

A report from the U.K.'s National Cyber Security Centre blames hostile foreign states for the majority of the 1,167 attacks dealt with in the past two years.

US Senators Urge Canada to Drop China’s Huawei Technologies in Building Future Telecom Networks

U.S. Senators Mark Warner, a Virginia Democrat, and Marco Rubio, a Florida Republican, both critics of China, have urged Canada to consider dropping China's Huawei Technologies from helping to build next-generation 5G telecommunications networks.

Facebook Security Vulnerability Allowed Attackers to Steal User Access Tokens Affecting 50 Million

Facebook alerted users today that its engineering team on Tuesday had discovered a security issue affecting almost 50 million accounts.

Security Experts, Privacy Advocates Hopeful Rollout of 5G Can Eliminate Surveillance Vulnerabilities

Security experts and privacy advocates see the rollout of the new 5G wireless network as a possible solution to eliminate surveillance vulnerabilities that allow spying on nearby phone calls.

Current Security Measures Not Enough to Protect Data in Lost or Stolen Laptops, Experts Warn

A weakness in modern computers allows attackers to steal encryption keys and other sensitive information, according to the latest discovery by cybersecurity firm F-Secure.