April 24, 2018
Via: Dark Reading.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says. In a troubling trend for enterprises and law enforcement, threat actors are ramping up their use of blockchain domains to hide malicious […]
April 24, 2018
Via: Security WeekDrupal developers announced on Monday that versions 7.x, 8.4.x and 8.5.x of the content management system (CMS) will receive a new security update later this week. The Drupal core updates, scheduled for April 25 between 16:00 and 18:00 UTC, will […]
April 18, 2018
Via: CSO OnlineThe first version of the SamSam (a.k.a. Samas or SamsamCrypt) ransomware was developed and released in late 2015 by a group of threat actors believed to reside in Eastern Europe. The group itself is mostly a mystery, but the code […]
April 13, 2018
Via: The HillCybersecurity experts say defense contractors are facing more aggressive attacks as nation states and other hacking groups increasingly use malicious software to block information or manipulate data. The companies that provide U.S. military and intelligence agencies with products and services […]
April 10, 2018
Via: Security WeekLast October the United States Computer Emergency Readiness Team (US-CERT) published a technical alert on advanced persistent threat (APT) activity targeting energy and other critical infrastructure sectors. Recently, it was updated with new information uncovered since the original report, and […]
April 4, 2018
Via: CSO OnlineWhen cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters. I’ve spent a good amount of time talking to CISOs over the past few months to […]
April 2, 2018
Via: CSO OnlineHackers made off with a whopping 5 million credit and debit card numbers from Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor, placing it “among the most significant credit card heists in modern history.” Parent company Canada-based Hudson’s […]
April 2, 2018
Via: Dark ReadingWith an ever-growing list of security and compliance requirements, security can hinder or slow business initiatives. Is your security department stuck in slow gear or can it go faster? There’s a fundamental push and pull between business and security that […]
Vulnerabilities, Wireless security
March 30, 2018
Via: Security WeekCisco has patched more than 30 vulnerabilities in its IOS software, including a critical remote code execution flaw that exposes hundreds of thousands – possibly millions – of devices to remote attacks launched over the Internet. A total of three […]
March 29, 2018
Via: Zone AlarmApril Fools’ Day is definitely the day of the year when everyone has their guard up. Hackers know that and tend to be extra active on April 1st. How? With the simplest maneuvers to trick users into clicking on links, […]
April 25, 2018
April 25, 2018
April 25, 2018
April 25, 2018
April 24, 2018
April 18, 2018
April 25, 2018
March 28, 2018
March 30, 2018
March 30, 2018
April 23, 2018
April 23, 2018
April 20, 2018
April 18, 2018
April 18, 2018