Ultimate Anonymity Services offers more than 35,000 RDPs for sale, including about 300 from the U.S.
Still, 45 percent of IT admins says they aren't concerned about bad password policies in the workplace.
The security software maker borrows deception techniques that enterprises use to keep network attackers running in circles and away from critical data.
Early victims include the Interfax news agency and Ukraine's Ministry of Infrastructure.
The botnet has the potential to launch a devastating DDoS attack.
The company's Direct Autonomous Authentication technology allows smartphone users to securely access services and other compatible devices without a separate download.
The attackers first hit third-party suppliers, then use those suppliers to breach major targets.
Two thirds of IT pros admit they've done the same.
Twenty-four percent were breached in the past year alone.
The application security specialist scores additional VC funding amid a cloud software boom.
The attacks forced Sweden's transport administration to stop or delay trains, and took down its website and email system.
The company announces new safeguards that protect users from phishing and malicious apps that can be used to steal data from their Google Accounts.
Major breaches of payment card data continue to be a regular occurrence in the hospitality industry.
At DockerCon EU, Docker Security lead explains that what's needed to improve security is more safety.
Any device using WPA2 wireless security is vulnerable.
VIDEO: Dino Dai Zovi, security researcher and CTO of Capsule8, details security concerns in container orchestration systems.