Entries by Trond Hagen

Secretary General gives keynote speech on NATO’s adaption to cyber threats

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT). “Cyber attacks are becoming more frequent, more complex and more destructive. From low-level attempts to technologically sophisticated attacks. They come from states, and non-state actors. From close to home and from very far away. […]

EU launches bug bounty programs for 15 software

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT). The European Commission decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project. Starting in January, the European Commission is going to fund bug bounty programs for a […]

4 Industries That Have to Fight the Hardest Against Cyberattacks

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT). Security Affairs gives you some insight to which industries that have to fight the hardest against cyberattacks… “Society’s dependence on internet-based technologies means security professionals must defend against cyberattacks as well as more traditional […]

Cloud computing is creating new challenges

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT) According to Mike Kun in an article for threatpost.com: “Cloud computing is creating new challenges among security professionals as attackers embrace the “as-a-service model”, giving unsophisticated cybercriminals a leg up in carrying out attacks.” […]

TLS 1.3 – Internet Security Gets a Boost

TLS 1.3 updates the most important security protocol on the Internet, delivering superior privacy, security, and performance. 10. august marks the formal publication of an overhaul of the Transport Layer Security (TLS) protocol. TLS is an Internet standard used to prevent eavesdropping, tampering, and message forgery for various Internet applications. It is probably the most […]

BF-SIRT Newsletter 2018-28

Botnet built with one exploit only A malware author has built a huge botnet comprised of over 18,000 routers in the span of only one day. This new botnet has been spotted this week by security researchers from NewSky Security, and their findings have been confirmed by Qihoo 360 Netlab, Rapid7, and Greynoise. The botnet […]

BF-SIRT Newsletter 2018-24

Launching VirusTotal Monitor, a service to mitigate false positives A new service from VirusTotal enables software developers to privately check and monitor application code against antivirus engines, in a bid to reduce false positives.   VirusTotal announced a new Monitor service on June 19 that could help to reduce malware false positives in software. Since […]

BF-SIRT Newsletter 2018-05

We need to prepare ourselves for that Meltdown/Specter-based Malware might be coming soon to devices near us, but are we ready? Lately researchers have discovered more than 130 malware samples trying to exploit these chip flaws.   Top 5 Security links Secret military bases revealed by fitness app Strava South Korea Warns of Flash Zero-Day flaw […]