Big Board

Content Ideas
Result Content Idea Research
Result Content Idea Research
1 Most Applications Contain Vulnerable Open Source Libraries
2 Contract for Web Can't Fix Privacy Problems If Security Isn't Included
3 GitHub Expands Scanning to Find Security Flaws in Code
4 CISA Releases 5G Security Strategy | Decipher
5 EU Delays GDPR Decision in Twitter Case
6 Wormable Flaw in Windows DNS Server Can Take Over IT Networks
7 Attackers Already Exploiting BIG-IP Vulnerability | Decipher
8 F-Secure Freedome VPN
9 Hacking Medical Devices to Hijack Secure Facilities
10 Lawmakers Ask for Cybersecurity Funding for States | Decipher
11 Banner Health Settles Data Breach Lawsuit | Decipher
12 Facebook Changes Developer Rules After Apps Improperly Got User Data
13 Cryptomining Botnet Steals AWS Credentials | Decipher
14 IBM Releases Open Source Encryption Toolkit | Decipher
15 Lawmakers Ask FTC to Investigate Data Brokers
16 Decipher Library: First Edition | Decipher
17 Google Rolls Out SameSite Cookie Changes to Chrome
18 Microsoft to Remove Windows Updates Using SHA-1 Hash
19 Microsoft's RDP Patch Isn't a Complete Fix
20 Unnamed Web Host Hit With DDoS Attack
21 Magecart Sets Sights on the SMB | Decipher
22 Researchers Develop Attacks Targeting End-to-End Encryption in Emails
23 GitHub's npm Acquisition Will Boost JavaScript Security
24 Keeping Up With Chrome, Firefox Browser Updates
25 Malware Infects NetBeans Projects In Software Supply Chain Attack
26 Microsoft DART Finds Six Attack Groups On Customer Network
27 Microsoft Pulls Buggy UEFI Security Update | Decipher
28 Changes in Kernel Code Created New Security Bugs in Android Devices
29 Security Norms Must Shift in a Crisis
30 Washington Is First State to Regulate Facial Recognition
31 Commission Outlines Ways to Overhaul Federal Cybersecurity
32 Interpol Arrests Possible Magecart Attackers in Indonesia
33 Mozilla, Google Crack Down on Malicious Browser Extensions
34 Browsers Will Block Sites Using Old Versions of TLS
35 Time, Not Money, Kills Bugs. | Decipher
36 MITRE Adds ICS-Specific Techniques to ATT&CK Framework
37 Lawmakers Ask FCC to Do Something About SIM Swapping
38 Microsoft Patches Flaw in Windows Cryptographic Component
39 New CacheOut Attack Impacts Latest Intel Chips
40 AWS mitigated a record-breaking 2.3 Tbps DDoS attack in February
41 Twitter's Direct Messages Is a Bigger Headache Than the Bitcoin Scam
42 More Security Endpoint Tech Isn't Always Better
43 California Releases Draft Rules for CCPA | Decipher
44 Deciphering The Net | Decipher
45 Malwarebytes Connects Magecart Group to Carbanak | Decipher
46 Geost Android Botnet Discovered by Basic Mistakes
47 Microsoft's Secured-core PC Takes Aim at Firmware Attacks
48 Supply Chain Security Requires Knowing Who to Avoid
49 Attackers Are Signing Malware With Valid Certificates
50 Magecart's Evolving Tactics Target Routers | Decipher
51 New Security Media Site, Decipher, Launches with Mission to Separate Facts from Fear
52 Disinformation Attacks Aren't Just Against Elections
53 Prices for Attack Tools on Dark Web Forums Remain Stagnant
54 Essential follows: Information security experts on Twitter
55 Why hackers want your health care data most of all
56 Improve Risk Perception, Get Better Decisions | Decipher
57 Enterprises May Not Know Which Devices Have URGENT/11 Flaws
58 Operation ShadowHammer Exploited Weaknesses in the Software Pipeline
59 Docker Hub Breach Can Have a Long Reach
60 Admins: Don't wait for ImageMagick patch
61 Nation-State Attacks Target Medical Research | Decipher
62 Equifax Settles Data Breach Lawsuits | Decipher
63 GitHub Brings Automated Fixes With Dependabot | Decipher
64 Want stronger passwords? Understand these 4 common password security myths
65 Mastercard, Microsoft Team Up for New Digital Identity Platform
66 Who We Are | Decipher
67 Wipro Breach Looks a Case of Gift Card Fraud
68 Don't let Badlock distract you from real vulnerabilities
69 Q&A: The Pioneers of Web Cryptography on the Future of Authentication
70 Google Wants to Change How Cookies Are Used
71 Capital One Breach Does Not Mean the Cloud is Insecure
72 Signing Into Websites With Google, Facebook is Good for Security
73 Show the proof, or cut it out with the Kaspersky Lab Russia rumors
74 Intel, NSF Invest $9 Million in Machine Learning for Wireless Networks Projects
75 NIST to security admins: You've made passwords too hard
76 Utah Privacy Law Protects Data From Government
77 Google zero-trust security framework goes beyond passwords
78 Demand for Cyber Insurance Is High, and So Are the Risks
79 Volusion The University of Maine
80 Most DNS Traffic Passes Through Just a Few Name Servers
81 Time is running out for NTP
82 Linux Worm Hits Unpatched Exim Servers | Decipher
83 GDPR Impact Lies in Big Fines, Process Changes
84 No Public BlueKeep Exploit Yet, But Clock is Ticking
85 Google Makes Encrypted DNS Generally Available | Decipher
86 BlueBorne is Bluetooth's Stagefright moment
87 3dcart The University of Maine
88 5G Networks Will Inherit Their Predecessors' Security Issues
89 France CNIL Fines Google, Forced Consent Violates GDPR
90 Home invasion? 3 fears about Google Home
91 How Cybersecurity Became 2017's Hot New Major
92 Facebook Stops Asking for Email Passwords | Decipher
93 BEC Scams Cost $1.2 Billion in 2018 | Decipher
94 Microsoft Will No Longer Recommend Forcing Periodic Password Changes
95 Criminals Sell Stolen Data on Social Media
96 Phishing scammers exploit Wix web hosting
97 Dyn DDoS attack exposes soft underbelly of the cloud
98 Personal Virtual Networks Could Give Everyone More Control Over Their Data
99 Huawei and the 5G Network Conundrum | Decipher
100 Government Targets Encrypted Messaging Apps in Going Dark Argument