Memcached DDoS Attack: Kill Switch, New Details Disclosed

March 8, 2018

Corero shares a kill switch for the Memcached vulnerability and reports the flaw is more extensive than originally believed. Corero Network Security has disclosed a “kill switch” for the Memcached vulnerability to national security agencies and shared new evidence indicating […]

How to Secure ‘Permissioned’ Blockchains

February 28, 2018

At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here’s how to maintain the integrity of the chain. Permissioned blockchains are growing in popularity as businesses attempt […]

Anatomy of an Attack on the Industrial IoT

February 23, 2018

How cyber vulnerabilities on sensors can lead to production outage and financial loss. We like to think that cyberattacks are focused primarily on stealing credit card numbers and that attackers don’t know much about the control systems that run critical […]


All You Need to Know About the Data Protection Officer

March 16, 2018

Via: Michael Boyd

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements […]


New POS Malware PinkKite Takes Flight

March 15, 2018

Via: Threat Post

A new family of point-of-sale malware, dubbed PinkKite, has been identified by researchers who say the malware is tiny in size, but can delivered a hefty blow to POS endpoints. Researchers at Kroll Cyber Security first identified PinkKite in 2017 […]


New Web-Based Malware Distribution Channel BlackTDS Surfaces

March 15, 2018

Via: Threat Post

A new traffic distribution system for malware is being offered as a service on the Dark Web and is promoting itself as an affordable way to deploy exploit kits and malware. The traffic distribution system (TDS) is being called BlackTDS […]