Stop the presses.
Forbes – A blog post from Imperva filed under “Research” makes the breathless claim that the author was able to impersonate someone else and execute a cross-site scripting phishing scam by exploiting flaws in the Auth0 identity-as-a-service platform.
New Indian Express – Centralizing surveillance, utilities and other essential services can potentially do more harm than good.
Auth0 Blog – A security researcher claimed that an attacker could perpetrate a phishing scam that could target a company using the Auth0 platform based on domain. Learn about this attack, the prevalence of phishing in the industry, and how to mitigate these scams.
SecurityWeek – Insecure configurations and vulnerabilities in communications and navigation systems can allow hackers to remotely track, hijack and sink ships, according to researchers at penetration testing and cybersecurity firm Pen Test Partners.
24/7 Wall St. – In what may be the last thing you want to hear about today, a security researcher claims that he was able to hack into Wi-Fi networks and satellite communications (satcom) on in-flight airplanes from a position safely on the ground. Four years ago the same researcher discovered critical flaws in satcom systems that allowed attackers to invade and disrupt communications links to airplanes, ships and military operations, among other networks.
IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be ‘weaponized.’
Dark Reading – It’s been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilities in satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.
Medium – MSLDev – The finance industry cannot afford to live in the past — one mired in poor customer perceptions, fewer user-centric processes and digital channels, legacy systems, and a slow response to an ever-changing technological landscape. The industry must adapt and adopt best practices in the delivery of its service in order to meet customer needs swiftly, conveniently, and on-demand, as well as become pioneers of innovation.
Blog Robotiq – Collaborative robots – more commonly known as cobots – work near people and help human employees get more done. If one or more cobots malfunctions due to a cybersecurity attack, the consequences could be dangerous and costly.
Fortunately, companies can take action to keep their cobots secure and working as expected.
So, you want a job in cybersecurity? Now is a good time to be looking.
Wall Street Journal – Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. The current demand for cybersecurity workers is outpacing supply by so much that by 2022…
The Parallax – Security patches don’t often come wearing gold-sequined tuxedo jackets, but maybe they should. If they did, everybody from consumers to security experts might pay more attention to them, and perhaps have a better understanding of why, when a vulnerability is discovered, “just patch it” isn’t exactly the answer.