CYF4.com Site Map
Pages
Posts
Posts by category
- Category: Alerts | CYF4
- Microsoft takes down massive hacking operation that could have affected the election
- REvil Ransomware Gang Offers $1 Million As Part Of Recruitment Drive
- China proposes ‘Global Initiative on Data Security’
- Twitter hackers busted 2FA to access accounts and then reset user passwords
- Strong cybersecurity strategy is no longer a luxury for small businesses
- How your passwords can end up for sale on the dark web
- Researchers find Windows bugs dominate – but fixes are fast
- It’s 2020 and hackers are still hijacking Windows PCs by exploiting font parser security holes. No patch, either
- Beware of bad Santas this Xmas: Piles of insecure smart toys fill retailers’ shelves
- How Researchers Are Fighting Back Against Ransomware
- How Americans Leave their Personal Info Open to Thieves
- Phishing Tactic Hides Tracks with Custom Fonts
- How Traditional Training Is Weakening Businesses’ Cybersecurity
- Hunt for Red Bugtober: US military’s weapon systems riddled with security holes
- The Biggest Email Security Challenge Facing Organizations Today
- Google Outlines Incident Response Process for Cloud Customers
- How To Protect Yourself Against a SIM Swap Attack
- How California’s New Consumer Privacy Act Stands to Impact Business
- Cybersecurity pros are limiting their personal use of Facebook, survey says
- Report: 99.7% of web apps have at least one vulnerability
- Business Email Compromise Losses Top $12B, FBI Warns
- Crypto-Mining Malware Rising Fast, Hackers Increasingly Targeting Cloud
- Loose .zips sink chips: How poisoned archives can hack your computer
- Every major OS maker misread Intel’s docs. Now their kernels can be hijacked or crashed
- Category: Bulletins | CYF4
- Swiss-U.S. Privacy Shield No Longer Considered Adequate by Swiss DPA
- You weren’t hacked because you lacked space-age network defenses.
- How to save a backup of all your Gmail
- North Korea’s state hackers caught engaging in BEC scams
- CYF4-ENVELOC Press Release 5-11-20
- Hackers Were Inside Citrix for Five Months
- Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers
- Mozilla Firefox to begin slow rollout of DNS-over-HTTPS by default at the end of the month
- If Uncle Sam could quit using insecure .zip files to swap info across the ‘net, that would be great, says Silicon Ron Wyden
- Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates
- LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach
- Maker of America’s license-plate, driver recognition tech hacked, camera images swiped
- The dark web knows too much about me
- A Year Later, Cybercrime Groups Still Rampant on Facebook
- How Call Centers are the Weakest Links in Authentication Chain
- How Walmart Uses a Purple Team to Improve Cyber-Resilience
- The Windows 10 security guide: How to safeguard your business
- Who needs malware? IBM says most hackers just PowerShell through boxes now, leaving little in the way of footprints
- DISA digs into blockchain as a service
- The APT Name Game: How Grim Threat Actors Get Goofy Monikers
- Americans want to regulate AI but don’t trust anyone to do it
- ‘Unprecedented’ DNS Hijacking Attacks Linked to Iran
- Making a Ransomware Payment? It May Now Violate U.S. Sanctions
- Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal
- Longer Minimum Passwords Help Prevent Fraud
- Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?
- Cloudflare Advances New Internet Standards for Speed and Security
- For Hackers, Anonymity Was Once Critical. That’s Changing
- Black Hat and Defcon cybersecurity experts share tips on how to protect yourself
- Black Hat 2018: Google’s Tabriz Talks Complex Security Landscapes
- Symantec Warns of Increasingly Sophisticated Tech Support Scams
- The Year Targeted Phishing Went Mainstream
- Plant Your Flag, Mark Your Territory
- Librarian Sues Equifax Over 2017 Data Breach, Wins $600
- Intel, Microsoft to use GPU to scan memory for malware
- Tenable Research Discovers Vulnerability in Critical Infrastructure
- The AI cybersecurity arms-race: The bad guys are way ahead
- AI for cybersecurity? What hospitals should understand before investing
- A lack of cybersecurity funding and expertise threatens U.S. infrastructure
- 4 telecom companies form a cybersecurity alliance. What will the impact be?
- Why router-based attacks could be the next big trend in cybersecurity
- Top cyber security certifications: Which certs do you need?
- Cybersecurity engineering: A new academic discipline
- 12-year-old “Cyber Ninja” shows how a hacker’s poison can spread
- Cybersecurity Drills more important than ever for Data Centers
- Ransomware keeps its hold on your data, Verizon says
- ‘Cyber attack’ takes out national government’s IT
- 4 steps to creating a winning cybersecurity strategy in 2018
- Psych! Colleges teach Phishing Lesson by targeting their own
- Unfilled cybersecurity jobs in San Diego prompt more cooperation between industry, local colleges
- Three Cybersecurity Lessons From Atlanta
- 3 Ways to Recruit and Retain Cybersecurity Resources
- 72% of cybersecurity pros say hiring video gamers could fix the IT skills gap
- Only 1% of media companies are ‘very confident’ in their cybersecurity
- The Cloud Is Rising To The Cybersecurity Challenge
- RSA Conference: CISOs’ top 4 cybersecurity priorities
- Seven Ways Technology Helps Businesses and Government Learn About You
- Cyber Train to Cyber Fight
- Citrix XenServer 7.4 update provides live migration solution
- VMware acquires E8 Security to boost endpoint management platform
- Boeing Possibly Hit by ‘WannaCry’ Malware Attack
- Mobile network infrastructure at growing risk from cyber attack
- Closing the gaps between cyber risk assessment mechanisms
- Report to Congress on Cybersecurity
- Category: Current Activity | CYF4
- Category: Tips | CYF4
- Category: Uncategorized