The Human Trafficking Institute rolled out the 2019 State Summaries, which provide an overview of federal human trafficking cases in all 50 states, the five U.S. territories, and the District of Columbia. While the number of forced labor cases has remained steady for a few years, the number of criminal sex trafficking cases as a nation has trended down since 2017.
Recently, two teens and a young adult infiltrated one of Silicon Valley’s biggest companies in a high-profile hack – and the biggest ever for Twitter. Authorities say the 17-year-old “mastermind” used social engineering tactics to convince a Twitter employee that he also worked in the IT department and gained access to Twitter’s Customer Service Portal. The 130-account takeover proved unique, as it was fundamentally a dramatic manipulation of trust and could have had far more world-changing consequences if the attackers had the aspirations of say, a dangerous fringe group versus that of a teenager. There are a few takeaways to learn here, especially when it comes to considering redefining what we classify as “critical infrastructure” and what must be protected at all costs.
Last week, Didier Reynders, European Commissioner for Justice, and Dr. Andrea Jelinek, Chair of the European Data Protection Board (EDPB), appeared at a hearing conducted by the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, and updated committee members on their work since the Schrems II decision.
In his remarks, Mr. Reynders identified three main areas on which the Commission is focusing.
To help Project 25 (P25) users navigate the continuing evolution of P25 systems and the complex world of P25 Standards, the P25 Steering Committee, with support from CISA, developed the Statement of Project 25 User Needs (SPUN) as a framework for users to better understand P25 technologies and define their communications needs.
Coalition announced the results of its H1 2020 Cyber Insurance Claims Report, which explores top cybersecurity trends and threats facing organizations today, in addition to data showing the impact of COVID-19 on cyber insurance claims.
There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment.
Digital Shadows released new research into a group of cybercriminals who are essential to the profitability of ransomware, but who are also often overlooked: initial access brokers. Initial access brokers gain remote access to vulnerable organizations, which an end-purchaser of ransomware or RaaS can then leverage to wreak havoc.
As some U.S. states relax their shelter-in rules, businesses prepare for a slow recovery due to the uncertainty of COVID-19’s almost certain resurgence. The questions arise for those physical businesses in need of unarmed or armed guards: what precautions are to be taken by guards, and what kind of interaction is there going to be with their customers?
The pandemic has redefined what it means to be a resilient business, especially when it comes to retail. “Essential” businesses that have remained open, such as supermarkets or pharmacies, have had to figure out how to operate safely in this new world. No matter the type of retailer, the importance of cybersecurity hasn’t gone away. If anything, it becomes more important as a cyber disruption could be the fatal final straw for a business looking for a smooth return to operations and maintain its brand image and reputation.
We talk to David “moose” Wolpoff, Chief Technology Officer (CTO) and co-founder of Randori, about Black Hats’ processes for finding and exploiting weaknesses in software.