Threats - Article Archives - Page 3

Open Source Summit: Securing IoT is About Avoiding Anti-Patterns

September 13, 2017 |

There are a lot of different pitfalls when it comes to IoT security that developers need to avoid.

READ MORE

New Bluetooth Attack Affects Billions of Devices Worldwide

September 12, 2017 |

The exploit, which requires no user interaction, can give the attacker control of the affected device.

READ MORE

Protecting Big Data: Over 26,000 MongoDB Servers Hit by Ransom Attacks

September 11, 2017 |

In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.

READ MORE

Lenovo Settles Superfish Privacy Claims with U.S. FTC for $3.5M

September 08, 2017 |

The simple lesson in this case is to not pre-install software that violates user privacy.

READ MORE

Equifax Web Application Vulnerability Exposes 143 Million Social Security Numbers

September 07, 2017 |

The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.

READ MORE

Critical Infrastructure Compromised: New Cyber Attacks Hit Energy Companies in U.S., Turkey, Switzerland

September 06, 2017 |

The Dragonfly group now appears to be focused on compromising operational networks.

READ MORE

Apache Struts Update Patches Critical Vulnerabilities

September 05, 2017 |

Widely used Java framework is once again updating for some highly impactful issues.

READ MORE

The Ransomware Epidemic: 23 Million Spam Emails Distribute Locky in a Single Day

September 04, 2017 |

The campaign is just one of many currently distributing Locky ransomware.

READ MORE

Reflected XSS Vulnerability in WordPress WooCommerce Patched

August 31, 2017 |

Widely used ecommerce module had a flaw that could have been used as a stepping stone to a larger attack.

READ MORE

VMware Outlines 5 Pillars of Cyber Hygiene

August 30, 2017 |

At the VMworld 2017 conference, VMware CEO Pat Gelsinger outlines the basics of improving cybersecurity.

READ MORE

Ransomware Insurance: Cyber Insurance May Be the Best Protection

August 25, 2017 |

Next to reliable data backups, a good cyber insurance policy may be your best protection against the damage wrought by ransomware attacks.

READ MORE

The Risk of an Unprotected Website: Ransomware Returns to Ukraine

August 25, 2017 |

For the second time in as many months, a software developer's website was compromised and used to distribute malware.

READ MORE

U.S. Infrastructure Council Warns of Imminent '9/11-Level Cyber Attack'

August 24, 2017 |

The NIAC says there's a 'narrow and fleeting window of opportunity' to organize effectively and prevent such attacks.

READ MORE

New Research Sheds Light on the Mirai Botnet

August 21, 2017 |

USENIX paper on Understanding the Mirai Botnet provides seven months of data insights into the IoT botnet.

READ MORE

Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign

August 17, 2017 |

Over 62,000 phishing emails delivered the new threat in the first three days of the campaign alone.

READ MORE

ICS Security Firm Dragos Raises $10M

August 14, 2017 |

VIDEO: Rob Lee, CEO and Founder of Dragos discusses his Black Hat USA session on the Crash Override attack.

READ MORE

The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

August 11, 2017 |

By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.

READ MORE

Git, SVN and Mercurial Open-Source Version Control Systems Update for Critical Security Vulnerability

August 10, 2017 |

The three major open-source version control systems were all at risk from a flaw that could enable arbitrary code execution.

READ MORE

Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

August 10, 2017 |

The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.

READ MORE

The Adventures of Anti-Virus and the Leaky Sandbox

August 03, 2017 |

VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.

READ MORE