Threats - Article Archives - Page 1

The Ransomware Epidemic: 23 Million Spam Emails Distribute Locky in a Single Day

|

The campaign is just one of many currently distributing Locky ransomware.

READ MORE

Reflected XSS Vulnerability in WordPress WooCommerce Patched

|

Widely used ecommerce module had a flaw that could have been used as a stepping stone to a larger attack.

READ MORE

VMware Outlines 5 Pillars of Cyber Hygiene

|

At the VMworld 2017 conference, VMware CEO Pat Gelsinger outlines the basics of improving cybersecurity.

READ MORE

Ransomware Insurance: Cyber Insurance May Be the Best Protection

|

Next to reliable data backups, a good cyber insurance policy may be your best protection against the damage wrought by ransomware attacks.

READ MORE

The Risk of an Unprotected Website: Ransomware Returns to Ukraine

|

For the second time in as many months, a software developer's website was compromised and used to distribute malware.

READ MORE

U.S. Infrastructure Council Warns of Imminent '9/11-Level Cyber Attack'

|

The NIAC says there's a 'narrow and fleeting window of opportunity' to organize effectively and prevent such attacks.

READ MORE

New Research Sheds Light on the Mirai Botnet

|

USENIX paper on Understanding the Mirai Botnet provides seven months of data insights into the IoT botnet.

READ MORE

Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign

|

Over 62,000 phishing emails delivered the new threat in the first three days of the campaign alone.

READ MORE

ICS Security Firm Dragos Raises $10M

|

VIDEO: Rob Lee, CEO and Founder of Dragos discusses his Black Hat USA session on the Crash Override attack.

READ MORE

The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

|

By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.

READ MORE

Git, SVN and Mercurial Open-Source Version Control Systems Update for Critical Security Vulnerability

|

The three major open-source version control systems were all at risk from a flaw that could enable arbitrary code execution.

READ MORE

Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

|

The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.

READ MORE

The Adventures of Anti-Virus and the Leaky Sandbox

|

VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.

READ MORE

Should the Internet be Secure by Default? Facebook CSO Says No

|

VIDEO: Facebook CSO Alex Stamos explains why security shouldn't be baked into the fabric of the internet and why researchers remain attracted to zero-day vulnerabilities.

READ MORE

Hackers' Revenge: Group Targets Cyber Security Analyst in Op #LeakTheAnalyst

|

Mandiant says the breach was limited to the analyst's social media accounts.

READ MORE

DEF CON Takes Aim at Smart Guns

|

Security researcher reveals that smart gun technology apparently isn't all that smart.

READ MORE

How DEF CON Securely Streams Video to Hackers

|

VIDEO: Videoman explains the networking setup used at the DEF CON 25 security conference to share video content.

READ MORE

Why You Need Multi-Factor Authentication: Virgin America Hacked Post-Merger

|

The hacker accessed 3,120 employees' and contractors' user names and passwords.

READ MORE

Can Cyber Insurance Keep Up? Cloud Cyber Attack Could Cost $121 Billion

|

Losses from a disruptive attack on a cloud services provider could range from $15 billion to $121 billion, according to Lloyd's.

READ MORE

Black Hat: How To Break the First Law of Robotics

|

Researchers at Black Hat conference reveal attacks against industrial robots.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|