Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Hack Naked NewsSubscribe
IOT, Mobile, Endpoint Security, Endpoint Security

HNN #231

August 27, 2019
Section 0

This week, a Hacker Finds Instagram Account Takeover Flaw Worth $10,000, a U.S. Judge orders Capital One hacker Paige Thompson to remain in prison, a Vast majority of newly registered domains are malicious, and why half of all social media logins are fraud! In the expert commentary, Jason Wood joins us to discuss Building Your First Incident Response Policy: A Practical Guide for Beginners!

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode231

Visit https://www.securityweekly.com/hnn for all the latest episodes!

The Security Weekly Sponsor’s Page

August 27, 2019

Hosts

Jason Wood

Jason Wood – Founder; Primary Consultant

Guests

http://traffic.libsyn.com/sw-all/HNN_231_-_August_27_2019-0_converted.mp3

Related

Patch management
7 vulnerabilities patched in Axeda IIoT remote management tool, popular in medical sector

Joe UchillMarch 8, 2022

PTC sunset Axeda in 2019, but the industrial IoT remote monitoring and management agent is still in use in several systems. Based on Forescout telemetry, it is particularly popular in active use within the medical sector, particularly lab testing and imaging.

IOT
Healthcare sector saw largest increase in IoT malware attacks in 2021

Jessica DavisFebruary 17, 2022

SonicWall Cyber Threat report shows the rate of IoT malware attacks are heaviest against the healthcare sector, spotlighting the continued pressure on critical infrastructure.

IOT
More than 100 tech companies, cyber organizations rally around 5 baseline security standards for IoT devices

Derek B. JohnsonFebruary 17, 2022

The organizations – ranging from private companies like Google, Microsoft and Deloitte to non-profits like Consumer Reports, the Center for Internet Security, and the Cyber Threat Alliance – say there is a “global consensus” forming around core IoT security standards that must be addressed through a mix of government regulation and voluntary private sector action.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.