SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

New Research Sheds Light on the Mirai Botnet

|

USENIX paper on Understanding the Mirai Botnet provides seven months of data insights into the IoT botnet.

READ MORE

Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign

|

Over 62,000 phishing emails delivered the new threat in the first three days of the campaign alone.

READ MORE

ICS Security Firm Dragos Raises $10M

|

VIDEO: Rob Lee, CEO and Founder of Dragos discusses his Black Hat USA session on the Crash Override attack.

READ MORE

The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

|

By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.

READ MORE

Git, SVN and Mercurial Open-Source Version Control Systems Update for Critical Security Vulnerability

|

The three major open-source version control systems were all at risk from a flaw that could enable arbitrary code execution.

READ MORE

TOP SECURITY THREATS RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Protecting Your Business from Cyber Destruction in 2017

A well-known analyst group predicts that in 2017, a Fortune 1000 organization will fail because of a cyber-attack. What are you doing to make sure that your organization isn't a victim? In this webcast, we'll provide you with the information you need, including: The current cyber threat …

Harnessing the Power of Metadata for Security

Download Gigamon's white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet …

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …
 
SEE ALL WHITEPAPERS
 
The Adventures of Anti-Virus and the Leaky Sandbox

The Adventures of Anti-Virus and the Leaky Sandbox

|

VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.

READ MORE
Should the Internet be Secure by Default? Facebook CSO Says No

Should the Internet be Secure by Default? Facebook CSO Says No

|

VIDEO: Facebook CSO Alex Stamos explains why security shouldn't be baked into the fabric of the internet and why researchers remain attracted to zero-day vulnerabilities.

READ MORE
Hackers' Revenge: Group Targets Cyber Security Analyst in Op #LeakTheAnalyst

Hackers' Revenge: Group Targets Cyber Security Analyst in Op #LeakTheAnalyst

|

Mandiant says the breach was limited to the analyst's social media accounts.

READ MORE
DEF CON Takes Aim at Smart Guns

DEF CON Takes Aim at Smart Guns

|

Security researcher reveals that smart gun technology apparently isn't all that smart.

READ MORE