Millie
your market intelligence analyst
Search Results
Edit Save
2,277 results
SC Magazine 10/18/2019 11:00
The U.S. Customs and Border Patrol (CBP) is considering using facial recognition in body cameras that agents will wear in the future, sending out a request for information (RFI) on biometric options that can be used to verify identity. This after California banned the use of facial recognition technology in body cameras and body cam…. .
SC Magazine 10/17/2019 17:19
Amazon.com Echo and Kindle devices were discovered last year to contain WPA/WPA2 protocol vulnerabilities that could potentially allow malicious actors to uncover keychains used to encrypt Wi-Fi traffic. The vulnerabilities, CVE-2017-13077 and CVE-2017-13078, are prone to Key Reinstallation Attacks (aka KRACK attacks), and were disclosed back in 2017 by a pair of Belgian researchers. In essence, they…. .
SC Magazine 10/17/2019 16:26
The threat group APT 29 has apparently returned to action with ESET uncovering three new malware families it is attributing to the cybergang. Apt 29/The Dukes is best known as being the primary suspect behind the Democratic National Committee breach during the runup to the 2016 U.S. presidential election, but the group had remained quiet…. .
SC Magazine 10/17/2019 12:39
Cisco today released 28 security advisories, in the process addressing a total of 30 vulnerabilities, including a critical unauthorized access bug found in the company’s Cisco Aironet Access Points (APs) software. Officially designated CVE-2019-15260, the flaw potentially can be exploited to view sensitive information, interfere with configuration options and disable the AP, in order to create…. .
SC Magazine 10/17/2019 12:17
VMware yesterday issued a security advisory acknowledging a critical “broken access control” vulnerability found in VMware Cloud Foundation and Harbor Container Registry for Pivotal Cloud Foundry (PCF). According to the advisory, malicious actors with administrative access to a project could potentially exploit the flaw in order to “create a robot account inside of an adjacent…. .
SC Magazine 10/16/2019 16:58
In what could be the poster child case for closing the barn door after the horse has left, the Baltimore City Council has approved the purchase of cyber insurance, six months after the municipality suffered a damaging ransomware attack. The Baltimore Sun reported the city conducted a bidding process and selected two plans. “The first…. .
SC Magazine 10/16/2019 15:20
Researchers have found what they are calling the first crpytojacking worm to spread to and from compromised containers in the Docker Engine. Named Graboid as an homage to the monster worm in the 1990 movie Tremors, the malware mines Monero cryptocurrency from infected machines and randomly spreads to other vulnerable hosts. Indeed, the malware contains a list…. .
SC Magazine 10/16/2019 13:14
WordPress rolled out version 5.2.4 patching six vulnerabilities as a short-term fix prior to the release of version 5.3. WordPress version 5.2.3 and earlier are affected by these bugs. The problems covered included an issue where stored XSS could be added via the Customizer, a method of viewing unauthenticated posts, a way to create a…. .
SC Magazine 10/15/2019 15:48
A cybergang has created a malicious website that dangles the reward of being able to jailbreak an iPhone, but instead injects the device with click fraud malware. The threat actors use the legitimate Checkm8 vulnerability, which does allow some legacy iOS devices to be jailbroken, as the basis for their program, reported Cisco Talos researchers…. .
SC Magazine 10/15/2019 12:47
David DeWalt has been appointed to iBoss’ board of directors as vice chairman. DeWalt is the founder of NightDragon Security and former CEO and chairman of McAfee and FireEye. iBoss believes DeWalt’s experience will help with the company’s effort to move from on-prem to the cloud. “The cloud has changed everything, not just enabling business…. .
SC Magazine 10/15/2019 12:28
It appears North Korean hackers have revisited a tried-and-true scheme to attack Mac owners who work at cryptocurrency exchanges: creating a fake company and corresponding cryptocurrency trading app that actually infects users with malware. Researcher Patrick Wardle, creator of OS X security firm Objective-See, reported in a blog post late last week that malicious actors…. .
SC Magazine 10/15/2019 08:00
Threat hunting is a human-led, machine-assisted initiative, where hunters look at datasets and patterns to determine whether there’s malicious activity or an active adversary in the network. As companies try to stay ahead of the latest, ever-evolving threats, it’s a practice that has become increasingly important to help monitor and manage what’s happening on the…. .

Energy

Business Issues

Companies - Public

Companies - Venture Funded

Chemicals - Agricultural

Chemicals - Industrial

Commodity Prices

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications