Threats

Stay informed on the latest cybersecurity threats and news to better protect your data, networks, applications, and devices. Our coverage includes emerging vulnerabilities, evolving attack techniques, and the latest security breaches to help you understand and mitigate risks.

  • Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

    Despite implementing multiple solutions to create a defense in depth and following all industry best practices, some of the very best IT security directors will confess that they have a very fundamental problem: They don’t really know how well their security is working. Until recently, enterprises have had limited capabilities for assessing the damage that…


  • Security Awareness Training for Employees for 2021

    Enterprises spend nearly $100 billion a year on cybersecurity, and despite sophisticated IT security defenses, one weak link – employees – remains a major vulnerability. Many attacks are stopped by firewalls, endpoint security products and advanced threat protection solutions, but somehow scammers keep getting past these and other defenses. As frustrating as it is to…


  • Mitigating the Memcached DDoS Threat

      Several security companies recently detected a series of massive UDP amplification attacks leveraging vulnerabilities in Memcached servers to speed up dynamic Web applications by caching data and objects in RAM. Link11 security analysts dubbed the new DDoS attack vector “Memcached Reflection,” noting that the attacks are similar to DNS reflection. “The attackers exploit the…


  • How to Defend Servers Against Cryptojacking

    Cryptojacking has become one of the most active and pervasive threats in recent years. In a cryptojacking attack, a cryptocurrency mining script is injected into a server or a webpage to take advantage of the victim system’s CPU power. The first article in this series defined cryptojacking and why it is a cybersecurity risk. In…


  • Hacking Blockchain with Smart Contracts to Control a Botnet

      TORONTO — Blockchain has been hailed by some in the technology industry as a potential method to help improve cyber security. However, security researcher Majid Malaika warns that Blockchain can potentially be abused to enable a new form of botnet that would be very difficult to take down. Malaika detailed his Blockchain-powered botnet in…


  • Two Thirds of Americans Worry About Hackers, Identity Theft

      Sixty-six percent of American adults worry frequently or occasionally about being a victim of identity theft, and 67 percent worry frequently or occasionally about having their personal or financial information stolen by hackers, a recent Gallup poll of over 1,000 U.S. adults found. In comparison, just 38 percent of respondents worry about having their…


  • Ransomware Insurance: Cyber Insurance May Be the Best Protection

      Many business leaders had been unaware of the severity of the ransomware problem until the WannaCry attacks in mid-2017 raised its profile significantly. In fact, ransomware has been around for several years, and has become the fastest-growing cause of cyber insurance business claims, according to data compiled by CFC Underwriting. The company says ransomware…


  • New Research Sheds Light on the Mirai Botnet

    New research presented at the USENIX conference is providing deep insight into the evolution of the Mirai botnet over a seven-month period. The Mirai botnet first achieved notoriety in September 2016 after attacking the site of a popular security blogger and hosting provider OVH with nearly 1 Terabit per second of Distributed Denial of Service…


  • Black Hat: Building a Ransomware Resilient File System with ShieldFS

    LAS VEGAS — The scourge that is ransomware has dominated security headlines over the last year, with large outbreaks like WannaCry and NotPetya shutting down critical infrastructure in affected organizations. Time and again, when ransomware outbreaks occur, operating system and security vendors alike remind users and organizations of the importance of having backups. But what…


  • Malware Behind Ukraine Blackout Analyzed

      Researchers at Dragos Security and ESET have released in-depth analyses of the cyber attack that caused a massive blackout in Kiev, Ukraine on December 17 and 18, 2016. Dragos identifies the malware as CrashOverride, while ESET calls it Industroyer. ESET senior malware researcher Anton Cherepanov wrote in a blog post that the malware is…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies