Feds Charge Two ATM Jackpotting Malware Suspects
Feds Dismantle Ukrainian's $530 Million Carding Empire
Uber: 'No Justification' for Breach Cover-Up
Thehackernews
British Hacker 'Lauri Love' will not be extradited to US, Court Rules
Cyber Espionage Group Targets Asian Countries With Bitcoin Mining Malware
Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers
Russian Scientists Arrested for Using Nuclear Weapon Facility to Mine Bitcoins
Watch Out! New Cryptocurrency-Mining Android Malware is Spreading
Rapidly
Infosecurity-magazine
Adobe Flash Zero-Day Spotted in the Wild
Hiscox: Global Firms Still Struggling to Get Cyber-Ready
NCSC’s ‘Active Cyber Defence’ Initiative Boasts Impressive First-Year Results
NHS Trusts Have All Failed Cyber Essentials — Report
Uber CISO: "No Justification" for Failure to Disclose Massive Breach
Winter Olympics Attack Expands with Top-Tier Spyware
Techrepublic
73% of firms fail cybersecurity readiness tests
How artificial intelligence is unleashing a new type of cybercrime
Report: Traditional cybersecurity costs enterprises a fortune and isn't helping
that much
Why cybersecurity skills should be taught at business schools
Why it's important to avoid FUD fatigue and threat rigidity when making
security decisions
Threatpost
IoT Security market expected to hit a CAGR of 14.9% from 2017 to 2027:
Research
Russian hackers exploit weakness in US cyber defense
Uber says hackers behind 2016 data breach were in Canada, Florida
SCMagazineUK
First SCADA cryptominer seen in the wild
Safer Internet Day: Data privacy is a necessity, not a luxury
Securing your company culture
Security shortage forces CISOs to increase reliance on machine learning
Serious DoS flaw spotted in WordPress platform - affects most versions
Computerweekly
Belgian police share Cryakl ransomware keys
More POS malware detected in the wild
Security Think Tank: How to evolve SecOps capacity
Security Think Tank: Take care of security basics before automating
Third party cyber breach risk set to rise
Healthcareinfosecurty
Hospital Hit With Cryptocurrency Mining Malware
Managing ‘Shadow IT’ Risks in Healthcare Settings
Partners HealthCare Breach: Why So Long to Confirm?
The Sorry State of Endpoint Security
SCMagazine
Hotspot Shield Vulnerability Could Reveal 'Juicy' Info About Users, Researcher
Cybercriminals exploiting traditional trust measures for compromises, study
Claims
Insurance Customers' Personal Data Exposed Due to Misconfigured NAS
MacUpdate hacked, cryptocurrency miner apps installed
Server
Leaky Amazon S3 Bucket Exposes Personal Data of 12,000 Social Media
Mulvaney ditches CFPB's Equifax probe
Influencers
9