News - Article Archives - Page 10

Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

August 10, 2017 |

The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.

READ MORE

The Importance of Effective Incident Response: the HBO Breach Expands

August 09, 2017 |

The attackers leaked more data, and demanded millions of dollars in bitcoin to prevent future leaks.

READ MORE

Google Patches Android for 49 Vulnerabilities in August Update

August 08, 2017 |

Once again, Google's media framework is home to the bulk of the patched issues.

READ MORE

AlienVault Scours the Dark Web for Compromised Credentials

August 08, 2017 |

The company's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.

READ MORE

IoT on Wheels: U.K. Government Issues Cyber Security Guidelines for Self-Driving Cars

August 08, 2017 |

The government recently published eight key principles to help manufacturers improve vehicle cyber security.

READ MORE

Cybersecurity Services Provider BlueteamGlobal Raises $125 Million

August 07, 2017 |

The company will offer threat monitoring and cyber defense security services to enterprises and SMBs.

READ MORE

19 Top UEBA Vendors

August 07, 2017 |

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We review the top UEBA products.

READ MORE

Researchers Add Profile-Based Anomaly Detection to SIEM

August 07, 2017 |

FKIE researchers say combining indicators can significantly reduce false positives.

READ MORE

U.S. Senators Seek to Improve IoT Security, Encourage Security Research

August 04, 2017 |

The Internet of Things Cybersecurity Improvement Act sets minimum requirements for the security of IoT devices purchased by the government.

READ MORE

Cybersecurity Startup GuardiCore Raises $15 Million

August 03, 2017 |

The company's threat detection platform uses deception-based and security intelligence technologies to thwart attacks. 

READ MORE

The Adventures of Anti-Virus and the Leaky Sandbox

August 03, 2017 |

VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.

READ MORE

New Anthem Breach Underscores the Need for Effective Cyber Risk Management

August 03, 2017 |

An insider breach at a third party vendor exposed thousands of Anthem members' PHI.

READ MORE

Should the Internet be Secure by Default? Facebook CSO Says No

August 02, 2017 |

VIDEO: Facebook CSO Alex Stamos explains why security shouldn't be baked into the fabric of the internet and why researchers remain attracted to zero-day vulnerabilities.

READ MORE

HBO Hack Highlights Importance of Encryption, Data Governance

August 02, 2017 |

1.5 TB of data, including unreleased episodes of upcoming shows, was stolen and leaked online.

READ MORE

Hackers' Revenge: Group Targets Cyber Security Analyst in Op #LeakTheAnalyst

August 01, 2017 |

Mandiant says the breach was limited to the analyst's social media accounts.

READ MORE

DEF CON Takes Aim at Smart Guns

July 31, 2017 |

Security researcher reveals that smart gun technology apparently isn't all that smart.

READ MORE

How DEF CON Securely Streams Video to Hackers

July 31, 2017 |

VIDEO: Videoman explains the networking setup used at the DEF CON 25 security conference to share video content.

READ MORE

Why You Need Multi-Factor Authentication: Virgin America Hacked Post-Merger

July 31, 2017 |

The hacker accessed 3,120 employees' and contractors' user names and passwords.

READ MORE

Can Cyber Insurance Keep Up? Cloud Cyber Attack Could Cost $121 Billion

July 28, 2017 |

Losses from a disruptive attack on a cloud services provider could range from $15 billion to $121 billion, according to Lloyd's.

READ MORE

Black Hat: How To Break the First Law of Robotics

July 27, 2017 |

Researchers at Black Hat conference reveal attacks against industrial robots.

READ MORE