Top

Tag: cyber security


Cloud security, Cyber-crime, Data loss

Five mental shifts we must make to achieve security beyond perimeters

December 20, 2017

Via: Help Net Security

Data centers aren’t exactly going extinct, but given the massive shift to public clouds, you need to make some significant adjustments if your mindset doesn’t already include or understand the cloud. The problem is that not every organization knows how […]


Malware, Vulnerabilities

DHS Warns of Malware Targeting Industrial Safety Systems

December 20, 2017

Via: Security Week

The National Cybersecurity & Communications Integration Center (NCCIC) of the U.S. Department of Homeland Security (DHS) on Monday published an analysis report on a piece of malware designed to target industrial safety systems. FireEye and Dragos reported last week that […]


Cyber-crime, Network security, Threats & Malware

Year in Review: How Did the Cyberthreat Landscape Change in 2017?

December 20, 2017

Via: Security Intelligence

The cyberthreat landscape has evolved over time, and 2017 saw an increase in attacks over the 90 million intrusions recorded in 2016. While threats such as ransomware are not new, this year saw a major paradigm shift in which malicious […]


Network security, Security, Tech

Mark Your Calendar for the Top Security Conferences of 2018

December 19, 2017

Via: Security Intelligence

Security conferences offer great opportunities to learn about the latest innovations and trends in the industry. They allow practitioners to interact directly with vendors and to network with their peers, putting a human spin on the technology-driven, often impersonal business […]


Cyber-crime, Security, Threats & Malware

Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE

December 18, 2017

Via: Help Net Security

Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a security researcher unearthed a keylogger in a driver used on a number […]


Cyber-crime, Data loss, Hacker

Is a Good Offense the Best Defense Against Hackers?

December 15, 2017

Via: Dark Reading

A proposed new law could make it legal for companies to hack back against attacker. But will it work? Destruction, loss of data, intellectual property theft, fraud, embezzlement, disruption to business, restoration—globally, the costs of dealing with hacking are staggering. […]


Cyber-crime, Malware, Threats & Malware

Cyber experts identify new malware targeting critical infrastructure

December 15, 2017

Via: The Hill

A hacker used a new type of malware targeting industrial control systems against a critical infrastructure organization in an attack that resulted in operations shutting down, according to cybersecurity experts. Cybersecurity firm FireEye, which has dubbed the malware “Triton,” saidThursday that its […]


Malware

Script-based attacks and overall malware on the rise

December 14, 2017

Via: Help Net Security

Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that scripting threats accounted for 68 percent of all malware during the period. The findings reinforce expectations of […]


Threats & Malware, Vulnerabilities

Google Bug Database Flaws Expose Severe Vulnerabilities

October 31, 2017

Via: Dark Reading

A security researcher was able to view some of Google’s most severe vulnerabilities due to flaws in the company’s internal bug tracking system, he said. The Issue Tracker, or Buganizer, as it’s known internally, is used among researchers and bug […]


Threats & Malware, Vulnerabilities

Stop Counting Vulnerabilities & Start Measuring Risk

October 31, 2017

Via: Dark Reading

As a security team, you are what you measure. The problem is that too many security teams are counting vulnerabilities, not measuring risk. It’s time we examine how vital it is for security teams to establish risk-based metrics, while offering […]