article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

The most concerning of these appears to be CVE-2020-1380 , which is a weaknesses in Internet Explorer that could result in system compromise just by browsing with IE to a hacked or malicious website. More information on CVE-2020-1337, including a video demonstration of a proof-of-concept exploit, is available here.

Backups 349
article thumbnail

Patch Tuesday, November 2020 Edition

Krebs on Security

” A chief concern among all these updates this month is CVE-2020-17087 , which is an “important” bug in the Windows kernel that is already seeing active exploitation. “With no details provided by Microsoft, we can only assume this is the bypass of CVE-2020-16875 he had previously mentioned,” Childs said.

Software 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2020 Likely To Break Records for Breaches

Adam Levin

2020 is on the path to becoming a record-breaking year for data breaches and compromised personal data. billion records have already been exposed, and that’s only accounting for the first quarter of 2020. The post 2020 Likely To Break Records for Breaches appeared first on Adam Levin.

article thumbnail

Microsoft Patch Tuesday, May 2020 Edition

Krebs on Security

” For example, Satnam Narang from Tenable notes that two remote code execution flaws in Microsoft Color Management ( CVE-2020-1117 ) and Windows Media Foundation ( CVE-2020-1126 ) could be exploited by tricking a user into opening a malicious email attachment or visiting a website that contains code designed to exploit the vulnerabilities.

Backups 260
article thumbnail

Monetization Monitor: Monetization Models and Pricing 2020

Customers demand—and suppliers offer—a diverse mix of monetization models for Software and Digital Services related to IoT Devices. However, many suppliers still struggle to get a full view of what’s being used by customers, what is owed to the vendors, and how a product is being used across the customer’s business.

article thumbnail

2020 Was a Secure Election

Schneier on Security

Over at Lawfare: “ 2020 Is An Election Security Success Story (So Far).” ” What’s more, the voting itself was remarkably smooth. It was only a few months ago that professionals and analysts who monitor election administration were alarmed at how badly unprepared the country was for voting during a pandemic.

article thumbnail

2020 Oscar Nominees Used to Spread Malware

Adam Levin

Online scammers are using the 2020 Oscars to spread malware. The post 2020 Oscar Nominees Used to Spread Malware appeared first on Adam Levin. A recent study released by Kaspersky Labs uncovered several hacking and phishing campaigns promising their targets free and early access to Best Picture nominees for this year’s Academy Awards.

Malware 309
article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Revenera’s 2020 Software Monetization and Pricing survey gathers input from leading software companies and provides you with key insights. Yet many software suppliers still struggle to get accurate insights into usage. Top findings include: Growing Interest in Usage Data.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this webinar, you'll be provided with a clear overview of the Anti-Money Laundering Act of 2020 (AMLA), which also includes the Corporate Transparency Act (CTA). The AMLA represents the most significant changes in U.S. anti-money laundering laws since the USA PATRIOT Act of 2001.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue.