July 6, 2015
Via: threats-and-malwareEveryone is interested in Threat Intelligence (TI). There is a race to the top of the mountain with regards to providing ‘Intelligence’ on the ‘latest threats’; but, what does that really mean for information consumers? Firstly, let’s look at the […]
June 22, 2015
Via: threats-and-malwareFor a long time the Winnti group had been considered as a Chinese threat actor targeting gaming companies specifically. Recently, we’ve seen information indicating that the scope of targets can be wider and is no longer limited to the entertainment […]
June 19, 2015
Via: threats-and-malwareThe Drupal Security Team has released a Critical software update for the Drupal CMS (Content Management System). Users with websites running either Drupal 6 or Drupal 7 are urged to upgrade immediately. The advisory that explains what’s been fixed, DRUPAL-SA-CORE-2015-002, […]
June 17, 2015
Via: threats-and-malwareSix researchers from Indiana University Bloomington, Peking University and Georgia Tech have recently published a paper in which they detail the existence of critical security weaknesses in Apple’s OS X and iOS – weaknesses that could be exploited by a […]
June 17, 2015
Via: threats-and-malwareCompanies spanning retailers, travel companies, media & entertainment, gambling firms and banks have far more mobile apps owned by them or referencing their brand than they are aware of, many of which come from a new breed of hacker intent […]
June 11, 2015
Via: threats-and-malwareThe group behind the Duqu cyberespionage tool has compromised at least two telecommunications operators and one electronic equipment manufacturer, in addition to a cybersecurity firm and venues that hosted high-level nuclear negotiations between world powers and Iran. On Wednesday, Moscow-based […]
May 5, 2015
Via: threats-and-malwareA new type of #malware resorts to crippling a computer if it is detected during #security checks, a particularly catastrophic blow to its victims. The malware, nicknamed #rombertik by Cisco Systems, is designed to intercept any plain text entered into […]
April 29, 2015
Via: threats-and-malware#malware typically used artificially inflate advertising revenues is now being used to promote Russian propaganda on the Dailymotion video site, according to a report released today by Trustwave. According to the report, the malware campaign starts out with the Angler […]
April 23, 2015
Via: threats-and-malware#ibm announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to […]
April 22, 2015
Via: threats-and-malware85,000 new malicious IPs are launched every day, and the top #phishing targets are technology companies and financial institutions, the new Webroot 2015 Threat Brief reveals. Presented at RSA Conference 2015, this year’s report provides the latest cyber threat trends collected […]
April 22, 2015
Via: threats-and-malwareThe Lastline Knowledge Base (LLKB) launched at the RSA Conference 2015. The new software module can be combined with the Lastline breach detection Platform to give security professionals context around incidents to respond to and defend against active breaches. The […]
April 22, 2015
Via: threats-and-malware#hp #security division is partnering with computer security company FireEye to give it a technological edge in detecting and investigating cyberattacks. FireEye’s #threat #detection and incident response capabilities will be incorporated into HP’s Enterprise Services. The companies are planning to […]
April 16, 2015
Via: threats-and-malware#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks […]
April 3, 2015
Via: threats-and-malwarePalo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly resourceful, dedicated adversaries. Called AutoFocus, […]
March 26, 2015
Via: threats-and-malwareEnterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system errors, not outsiders. According to Ponemon’s 2013 Data Breach […]
March 19, 2015
Via: threats-and-malwareThe mystery high-severity flaw that people were expected to be fixed in #openssl is no Heartbleed, but it is serious and users should update. Earlier this week, the OpenSSL Project advised users that patches scheduled to be released Thursday will […]
March 16, 2015
Via: threats-and-malwareIf you use the Internet, you have probably had to prove your identity by jumping through an extra hoop. Perhaps it was entering the code from a special app, or copying the code from a text message. But if that […]
February 25, 2015
Via: threats-and-malware#dtex systems, a security company born in Australia 15 years ago, is just now bringing its insider-threat-detection software to the U.S. Using a given user’s #network behavior, the Dtex platform businesses can figure out actions such as whether the employee […]
February 17, 2015
Via: threats-and-malwareThis week, #kaspersky Labs published detailed information on what it calls the Equation Group — almost certainly the #nsa — and its abilities to embed #spyware deep inside computers, gaining pretty much total control of those computers while maintaining persistence […]
January 14, 2015
Via: threats-and-malwareA #security researcher has discovered a serious #bug in the WebView component of #android 4.3 and below that could open up #phones to malicious hackers. But Google is doing nothing about it. The bug, discovered by Tod Beardsley from Rapid, […]