November 21, 2018
Via: SecurelistThere’s nothing more difficult than predicting. So, instead of gazing into a crystal ball, the idea here is to make educated guesses based on what has happened recently and where we see a trend that might be exploited in the […]
November 2, 2018
Via: Help Net SecurityIn an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to transfer patches, updates and files to those systems. But that choice is not devoid of […]
October 24, 2018
Via: Security AffairsSecurity experts from Sophos Labs have spotted a new piece of IoT malware tracked as Chalubo that is attempting to recruit devices into a botnet used to launch DDoS attacks. Security experts from Sophos Labs have spotted a new piece […]
October 9, 2018
Via: Symantec ConnectCloud computing has gone mainstream as more organizations shift their applications and workloads from on-premise data centers to public cloud platforms. Almost every company in the world—96 percent, according to one annual survey[1]—has moved some part, if not the majority, […]
September 27, 2018
Via: Dark ReadingVPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors. Malware writers are finding greater efficiencies by reusing older code families. That explains why VPNFilter — the attack that caused the FBI to recommend that everyone […]
September 25, 2018
Via: SecurelistIn 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were […]
September 24, 2018
Via: Dark ReadingIndustry leaders are scrambling to address the issue, which will take new thinking to overcome. This year, the US government paid out its largest bug bounty yet — during the government-run “Hack the Air Force” program — for a vulnerability […]
September 20, 2018
Via: SecurelistWhile conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors […]
Application security, Cloud security, Network security
August 8, 2018
Via: Dark ReadingAPIs provide the digital glue that binds apps, cloud resources, app services and data altogether – and they’re increasingly an appsec security threat. Last year the category of underprotected APIs cracked the OWASP Top 10 list for the first time. […]
July 16, 2018
Via: Security IntelligenceSharing computer security threat information is now an established practice in IT. Whether automatically or manually, the primary motivator to pool resources is to improve your own capabilities and those of your peers for responding to security threats and incidents. […]
July 9, 2018
Via: Dark ReadingAt a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats. Russian President Vladimir Putin called on countries to better cooperate in the fight against cyberattacks during his address at a Moscow […]
June 1, 2018
Via: Dark ReadingA report from the Departments of Commerce and Homeland Security provides five goals for protecting infrastructure from botnets and other automated threats. In May 2017, the Trump administration issued Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical […]
May 24, 2018
Via: Security WeekMonitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles. For […]
April 18, 2018
Via: CSO OnlineThe first version of the SamSam (a.k.a. Samas or SamsamCrypt) ransomware was developed and released in late 2015 by a group of threat actors believed to reside in Eastern Europe. The group itself is mostly a mystery, but the code […]
April 18, 2018
Via: CSO OnlineCyptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year, according to Comodo Cybersecurity Threat Research Labs’ Q1 Global Malware Report. In the first three months of 2018, Comodo said it “detected 28.9 million cryptominer incidents […]
Network security, Threats & Malware
March 8, 2018
Via: The HillFBI Director Christopher Wray on Wednesday said the bureau must be prepared to confront a new set of emerging cyber threats. “The digital environment presents new challenges that the FBI has to address in terms of what’s coming down the […]
February 14, 2018
Via: itCuratedGiven the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]
December 8, 2017
Via: The HillComputers hackers are increasingly targeting local governments with cyberattacks for financial gain. Hackers this week successfully infected government servers with malware in North Carolina, locking Mecklenburg County officials out of their systems and slowing its operations to a crawl. Hackers […]
November 17, 2017
Via: SecurelistAs hard as it is to believe, it’s once again time for our APT Predictions. Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new […]
November 2, 2017
Via: Security IntelligenceVery little in life grabs our attention like a shiny new object. The gleam can be irresistible, the glitter mesmerizing. That’s how it is in cybersecurity, where the landscape is almost always dotted with alluringly novel hazards. Brand new threats, […]