October 2012 ( View complete archive page )
November 2012 ( View complete archive page )
January 2013 ( View complete archive page )
- Certification Training
- Free Monthly Cyber Warnings Via Email
- Thanks To Emsisoft For The Malware Cleanup Holiday Goodies
- Comodo Endpoint Security Manager Helps Solve BYOD Dilemma
- SophosLabs Says – Stay Away from Sudoku This Winter!
- National Information Security Group Offers FREE Techtips
- Top Twenty INFOSEC Open Sources
- RSA® Conference 2013
- Hong Kong Police Launch New Technology Crime Division (TCD)
- Hong Kong Based Servers Deploying Infected Angry Birds
- Annual US Cyber Flag exercise provides realistic training
- Senate Passes Cybercrime and Anti-Espionage Bills
- Experian Lands $12 million Contract after State Data Breach
- RSA Opens New Anti-Fraud Command Center
- Is Your HVAC (Air Conditioning) the Next SCADA Target?
- Emsisoft Receives Editor's Choice Award for 2013
February 2013 ( View complete archive page )
- MiniDuke hackers target European governments and researchers
- GlobalSign Leads the Pack of Certificate Authorities (CAs) as Market Innovator
- Symantec Research - Stuxnet was dated 2005
- New Zero-Day Vulnerabilities affect Java Earlier Versions
- Security vulnerabilities menace privacy of millions of HTC devices
- Emsisoft warns: various NBC websites hacked and spreading malware
- Microsoft hacked ... another enterprise targeted by hackers
- Pwnie Express Introduces New Penetration Testing Products During RSA 2013
- Mandiant report links Anonymous 2011 hacks to APT1 campaign
- Anonymous hacked US State Dept, investment firm in homage to Aaron Swartz, Lulzsec
- After Twitter and Facebook also Apple has been hacked
- Government networks vulnerable to cyber attacks
- Mandiant Tracks Down Well Organized Chinese Hacking Group
- Facebook compromised by zero-day Java exploit
- Botnets for rent, criminal services sold in the underground market
- Cybersecurity Strategy of the European Union – the proposal
- Adobe 0-days exploited for IEEE aerospace spearphishing attacks
- Bit9 hacked, stolen digital certificates to sign malware
- CISPA reloaded, qui custodiet ipsos custode
- Does the US really think to leverage preemptive cyber attacks as a deterrent?
- Federal Reserve computers hacked by Anonymous
- F-Secure Releases Threat Report: Closer Look at CyberSecurity Landscape
- US Department of Energy hit by a Sophisticated Cyber Attack
- Cyber Newsflash for January 2013
- Free Monthly Cyber Warnings Via Email
- Cyber Defense Test Labs Next Generation Security Switch Spotlight
- Cyber Defense Test Labs Review: Emsisoft Anti-Malware 7.0
- National Information Security Group Offers FREE Techtips
- Cyber Crime and Cyber War Predictions for 2013
- Top Twenty INFOSEC Open Sources
- RSA® Conference 2013
- Certification Training
- Romanian Hacker Remotely Hacks into and Steals Payment Card Data from Hundreds of U.S. Merchants’ Computers
- Chinese Hackers Exploit Internet Explorer Zero Day for Cyber Espionage
- Checkout Concise-Courses Free Hacker Hotshots
- Bouncer, new phishing variant from RSA
- 10 Ways to Protect your Privacy and Identity on Windows
- Twitter Hacked...Did you get the CDM tweet on this today?
- AppRiver Threat Predictions for 2013
March 2013 ( View complete archive page )
- Largest DDoS of ever vs Spamhaus a menace to global internet
- Exclusive -Details on Investigation of Group-IB on new age of POS malware
- First APT attack on Android targeted Tibetan and Uyghur activists
- OpIsrael and attack to Mossad, cyber dispute or misinformation campaign?
- Mobile Botnets: are all around us!
- Multiplatform Wiper widespread in attacks against South Korea
- Also China under attack
- NATO and definition Rules For Cyber Warfare
- FinFisher found everywhere, more complexity and ready for mobile
- Tension on the Korean Peninsula, cyber armies to comparison
- Gaming platforms as vector of cyber attack according ReVuln
- Android Malware Seeds for Sale
- Threat Intelligence Report by Solutionary, rise of cyber attacks
- Microsoft Skype accused of supporting the surveillance in China
- The offer of Russian underground for phishing campaigns
- The malicious mobile marketplace explained by Group-IB
- Digital certificate stolen to Bit9 used to sign Java exploit
- Threat Report H2 2012 proposed by F-Secure
- How to organize a botnet in a rapid, efficient and economical
- US tries to scare waves of hackers proposing a retaliation strategy
- Evernote hacked, how to respond to yet another data breach?
- Phishing reloaded, the migration to mobile
April 2013 ( View complete archive page )
- LivingSocial data breach exposed 50 million customers records
- FireEye report on advanced cyber attacks landscape
- Yahoo! Blind SQL Injection could lead to data leakage
- Hacktivists hacked Twitter account of Associated Press to post fake news
- New wave of DDoS against EU Banking can hide a sinister mystery
- Cyber security bill CISPA is passed
- Group-IB detected malware that hit Russian stock-trading platform
- New dangerous threat Magic Malware hit thousands of UK firms
- DHS alerted energy companies on ongoing spear-phishing campaign
- In the mind of cybercriminals – The Boston Marathon attack
- Hijacking plane's navigation system with Android, reality or unnecessary alarm?
- How to respond to a data breach
- Winnti - a cyber espionage case for gaming industry
- You play I hack you ... ReVuln online poker security
- Security B-Sides is Coming to Boston, May 18th, 2013
- Skype Tool for criminals offered
- Wandering in the underground, from exploit kits to hacking services
- Cybercrime follows money, malware for Bitcoin mining spread via Skype
- #OpIsrael: April 7, 2013 - Anonymous launched a massive attack against Israel
- Soaring of Bitcoin value continues to attract cybercrime
- The role of hacktivism in cyber warfare scenarios between 2 Koreas
- vSkymmer botnet, a financial malware appears in the underground
- Botnet malware authors use Evernote account as C&Control Server
- Webroot - Impact of Web-borne threats on businesses
May 2013 ( View complete archive page )
- Two-factor authentication, necessary but not sufficient to be safe
- Watering hole attacks and exploit kits - Indian gov site case
- New wave of cyber attacks from Iran hit US
- US critical infrastructures under unceasing cyber attacks
- Cost of cybercrime for UK Small Businesses
- Operation Hangover, the Indian Cyberattack Infrastructure
- LEVERAGING REFERENTIAL DATA FOR BETTER THREAT DETECTION
- Zero-day market, the governments are the main buyers
- Google Company’s Surveillance Database hacked by same hackers who hit BigG in 2010
- Nir Goldshlager reveals how to hack Facebook Apps
- Warning: Hackers Can Destroy Your SCADA Supervision Station
- WSIS Forum 2013 - Securing Cyberspace in a borderless world
- US Air Force notice on military use of social media
- Group-IB Exclusive details on Kangoo botnet that hit Australian banks
- The offensive approach to cybersecurity, motivations and risks
- Bloomberg data breach, online 10,000 private messages
- Apple decrypts seized iPhones for law enforcement
- Bank robbery Global Network of cyber criminals stole $45m from ATMs
- A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets.
- QinetiQ breached by long Chinese cyber espionage campaign
- OpUSA, Anonymous against US Banking and government offices
- RSA Conference Asia Pacific 2013
- APWG Mobile Financial Fraud report & mobile black market
- The Challenges of Near Real-Time Situational Awareness
- US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked
- APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the scope of the global phishing problem.
- Advanced Mobile Security in the Age of Consumerization
- Adobe Systems' Reader vulnerability reveals where a PDF is opened
June 2013 ( View complete archive page )
- Digital certificate stolen from Opera infrastructure
- Car hacking is today possible due the massive introduction of technology in our vehicles
- Oil and gas firms have been urged to be vigilant to security attacks as OpPetrol
- Researcher Egor Homakov demonstrated the possibility of Webcam hacking
- US law enforcers suggest a kill switch for mobile and Apple adapts
- Megaupload files deleted by LeaseWeb
- Carberp banking Trojan source code for sale at $5K in the underground
- RARSTONE, TrendMicro revealed Naikon cyberespionage campaign
- Verizon, large scale cyber espionage from China and much more
- US Cloud hosting providers targeted by cybercriminals
- Is RBN (Russian Business Network) really linked to Facebook Zeus variant?
- The business behind a cashout service for cybercriminals
- Kaspersky detected most sophisticated Android trojan
- Choosing a DDoS mitigation solution … the cloud based approach
- PRISM - US Top Secret massive surveillance program revealed
- NSA collecting phone records of millions of US citizens daily
- iCloud two-factor protection - security flaw or deliberate choice?
- NetTraveler, new global cyber espionage campaign from Kaspersky
- Drupal data breach exposes data of 1 million users
- Group-IB: Senior management is one of the targets of modern cybercriminals
July 2013 ( View complete archive page )
- New Best Practices for Detecting Malware in the 21st Century
- Researcher demonstrated SmartTV hacking on Samsung models
- Context Information Security report "Web Application Vulnerability Statistics 2013
- Vulnerability disclosed pwds of all Barracuda Network Employees
- Who has hacked the Apple iOS Developer Center?
- Security experts uncovered an unusual cyber espionage ....
- Hackers breach Nasdaq community forum website
- Korea sets out to train more cyber experts, hackers
- Trend Micro - targeted attack against Europe-Asia government agencies
- Cyber Intelligence Europe 2013
- Gaming platforms under attack - Nintendo and Ubisoft hacks
- Researchers can hack Verizon Wireless femtocells to spy on customers
- Oil & Natural Gas Cyber Security - CYpBER 2013
- Cybercriminals Leveraging Facebook is the title of a research
- Are You Inviting Hackers into Your Network?
- Hackers hit South Korea also spread spyware to steal military secrets
- The cybercrime ecosystem, resources,motivations and methods
- Android Hack-Tool discovered by F-Secure
- Best Practices for Keeping Assets Safe In Virtualized Data Centers
- DropBox account hacking bypassing two-factor authentication
- Self-propagating ZeuS source code offered for sale
- Android botnets on the rise
- SIM Card Forensics
- Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance
- Two-factor Authentication for SMBs
August 2013 ( View complete archive page )
- China hit by DDoS attack. The Internet inaccessible for hours
- Poison Ivy still alive … old malware new cyber threats
- Top Five Things You Should Do To Protect Your SmartPhone
- Brain hacking, it's time to protect our mind from hackers
- Information Warfare, Russia, New Zealand...it is arms race
- DDoS to hide attacks against wire payment switch systems
- Firefox Zero-day vulnerability against Tor anonymity network
- USB Internet Modems vulnerability exposes Millions of PCs
- ENISA Annual Incident Reports 2012
- Android malware uses Google Cloud Messaging Service as C&C Server
- Chinese hackers that hit NYT evolving their techniques
- Android wallet apps vulnerability could allow currency theft
- The cyber capabilities of Iran can hit US
- AndroRAT drives the rise for DIY Android hacking tools
- Comment Crew group of hackers has been identified during an attack...
- DNS impairment redirects thousands of websites to malware
- FBI is using mobile Android malware to spy on suspect
- Vulnerability in Windows Phone OS could allow information disclosure
- Breach, the new attack techniques against SSL TSL
- Cyber espionage - White House employees personal email hacked
- XKeyscore, revealed another surveillance tool used by NSA
- Superfecta report Q2 2013, constant increase for automated attacks
- Black Hat USA 2013 - Insider Only Content
September 2013 ( View complete archive page )
- Chinese hackers increasingly attracted to the drone technology
- No good news from ENISA Threat Landscape Mid year 2013
- Chaos Computer Club claims to have defeated Apple TouchID
- FireEye revealed APT Operation Deputy Dog against Japanese entities
- NSA tried to insert backdoor into Linux
- 12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE
- Microsoft confirmed existence of a new IE zero
- CBMEN, DARPA's peer-to-peer technology for battlefield
- Belgacom hack, state-sponsored attack hypothesis
- Kaspersky reveals Kimsuky operation that is targeting South Korea.
- A look to Android offer in the underground mobile market
- Mevade botnet responsible for the spike in Tor traffic
- Hesperbot, the new powerful banking Trojan found by ESET
- Surveillance - NSA can access data on your mobile device
- NetTraveler APT hackers still active improved their attacks
- Traffic Correlation Attacks against Anonymity on Tor
- Why SQL injection is the cybercriminals weapon of choice
- A False Lens of Security
- Reversing Dropbox client code raises security issues
- PRISM repercussion on the Tor network accesses
- Cybercrime abuses Facebook paid advertisements
October 2013 ( View complete archive page )
- Syrian Electronic Army hacked President Obama website and social media
- LinkedIn Intro iOS app intercept user's emails in iPhone and much more
- Android Wroba banking trojan targeted Korean users
- Root access backdoor discovered in Chinese Tenda Wireless Routers
- Verizon Wireless - how a simple bug could cause a disaster
- A backdoor present in many D-Link devices allows to bypass authentication
- Google Chrome users are vulnerable to sensitive data theft
- How to exploit iFramed based traffic E-shop for illegal activities
- Blackhole author arrested. The impact on the underground market
- 2013 Norton Report, the impact of cybercrime according Symantec
- Ponemon Institute issued the 2013 Cost of Cyber Crime Study
- How to create undetectable malware with Mac encryption mechanism
- Upcoming Awards
- How NSA tries to compromise Tor anonymity. Tor Stinks document
- Adobe security breach, hackers steal 2.9M accounts and source code
- Proxy.sh - Can you trust your VPN provider? Maybe ...
- F-Secure published Threat Report H1 2013 on security landscape
- Criminals hacked illegal service exposing Americans to Identity theft
November 2013 ( View complete archive page )
- Internet of Things - Symantec has discovered a new Linux worm
- Cyberespionage – Chinese Hackers targeting US Cloud service providers
- Mobile apps security study conducted by HP Fortify
- NSA compromised more than 50000 networks with malware
- Hacking Google Gmail accounts exploiting password reset system flaw
- British blogger discovered LG Smart TV spying on users
- Why Nigerian Banks Will Keep Losing Money to e-Fraud
- Jeremy Hammond on state-sponsored hacktivism
- A new modular malware platform sold on the underground
- Discovered Open URL Redirection flaw in Facebook
- GCHQ used fake LinkedIn and Slashdot to hack GRX providers and OPEC
- FireEye has identified a new IE zero-day exploit
- Google Bot activity abused doing SQL Injection Attacks
- Stuxnet infected the network of Russian nuclear facility
- I don’t like – Facebook Clickjacking and track screen cursors
- A Zero-Day Vulnerability in Microsoft Graphics Component - CVE-2013-3906
- Finland's Ministry of Foreign Affairs hit by extensive cyber espionage
- Anonymous OpNSA Campaign - OSINT to predict DDoS attacks on Nov 5th
- uProxy, Digital Attack Map and Project Shield,Google to secure the web
- Israel - AP Exclusive reveals tunnel hit by cyber attack
December 2013 ( View complete archive page )
- eBay XSRF flaw allows attacker to make unauthorized purchases
- The value of stolen card data that includes localization info
- Hackers have compromised a misconfigured cloud server in less than 4h
- RSA refused claims on NSA Relationship and encryption backdoor
- NSA paid 10M$ to RSA to insert an encryption backdoor in its solution
- Target retailer investigating data breach involving 40M card accounts
- Website traffic report shows an increase of malicious bots activity
- Safari browser stores in plain text previous secure session data
- Cyber security, Questions and Answers with the expert
- NSA and GCHQ infiltrated virtual online gaming communities
- Detected 64 bit ZeuS banking trojan using Tor network
- Near East - new heaven for bulletproof hosting providers, first effects of cyberwar
- Chinese Hackers Spying on European Diplomats
- French Government ANSSI responsible of a MITM against Google SSL-TLS
- Microsoft, Europol, FBI and partners decapitated ZeroAccess botnet
- D-Link upgrades its firmware to fix backdoor presence
- Potentially Unwanted Programs secretly serve Bitcoin miner
- Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet
- MS Windows XP CVE-2013-5065 Eleventh zero-day flaw found by FireEye
January 2014 ( View complete archive page )
- FBI seized Tormail database, it has the access to all users emails
- More than 350,000 Android devices impacted by bootkit trojan
- Israeli Defense computer hacked via spear phishing attack
- Discovered first Win trojan to serve banking Android malware on mobile
- Spear phishing against Microsoft, exposed law enforcement inquiries
- Arts and crafts retailer Michaels Stores Inc warns over credit card fraud
- Privacy violation: NSA is not the only eavesdropper
- Who is spying Tor on network exit nodes from Russia?
- Weak passwords, in 2013 it is still a frequent error
- An increasing number of targeted attacks against the energy sector
- IoT - Discovered first Internet of Things cyberattack on large-scale
- CDM Newsflash: TeamBerserk Hacked DHS Fusion Center Documents
- Internet of Things and principal cyber threats
- Kaspersky discovered Icefog Hit US energy companies with Java Backdoor
- After Target also Neiman Marcus retailer confirmed a data breach
- Cisco confirmed that a Backdoor affects small business devices
- Microsoft hacked by Syrian Electronic Army for second time in 2014
- What the Average Joe should know about NSA
- openSUSE Forum hacked. Pakistani hacker compromised internal database
- Project NETRA - The Indian Internet Surveillance
- Malware served through Yahoo advertisements
- Quantum computer is the future weapon of NSA
- DROPOUTJEEP - How NSA completely controls your iPhone
- Skype's blog and Twitter account compromised by Syrian Electronic Army hackers
- Snapchat users menaced by a couple of malicious exploits
February 2014 ( View complete archive page )
- Apple restores certificate validation checks mysteriously missed
- iBanking Mobile Bot Source Code available for sale in the underground
- South Korea is developing a cyber weapon to hit North Korean nuclear
- Cyber Defense Magazine Announces Infosec Awards Winners for #RSAC 2014
- Largest Bitcoin exchange MtGox shut down, earthquake in the Bitcoin industry
- Banking trojan hit a large number of Islamic Mobile Banking Customers
- Discovered thousands of FTP servers infected by malware
- FireEye discovered a new watering hole attack based on 0-day exploit
- FireEye discovered a new watering hole attack based on 0-day exploit
- MOON, the strange worm spreading on Linksys routers
- MOON, the strange worm spreading on Linksys routers
- The crowd-funding site Kickstarter has been Hacked
- Unclassified NSA memorandum provides further details on Snowden case
- NIST has published cybersecurity framework for critical infrastructure
- JackPOS malware presented as a Java Update Scheduler
- The Mask - the most sophisticated APT operation seen to date
- Snowden has leaked secret documents with a common web crawler
- Disconcerting Report on cybersecurity for US Government entities
- Hackers use encryption to server a GameOver Zeus banking malware
- Syrian Electronic Army hacks into Facebook's domain
- US Intelligence warns on Counterintelligence and cyber espionage
- Syrian Electronic Army hacked Ebay and Paypal websites
- Six Perils of BYOD Data Security Exploitation
- Admiral Rogers chosen as new NSA director.The man of Information Warfare
March 2014 ( View complete archive page )
- Coinkrypt Android malware used to mine digital currencies
- Gameover ZeuS is Targeting recruitment websites
- Pileup flaws in Android PMS menace more than 1 Billion devices
- Another zero-day vulnerability is threatening the Microsoft world
- For Google it is time to encrypt all GMail connections
- IntelCrawler profiled Syrian Electronic Army group
- Tor browser app in the Apple app store is fake
- Darpa is looking for experts from private sector for future cyber ops
- Nearly 7600 critical infrastructure vulnerable to bugs in Yokogawa App
- A sophisticated phishing scheme is targeting Google Docs Users
- Syrian Electronic Army hacked the US CENTCOM
- HTTPS traffic analysis can leak user sensitive data
- $5 Billion in Military Cyber Spending fivefold increase over last year
- $5 Billion in Military Cyber Spending fivefold increase over last year
- DNS amplification botnet available in the underground
- DNS amplification botnet available in the underground
- Facebook 'Naked Video' scam hits 2 million users
- Facebook 'Naked Video' scam hits 2 million users
- SNAKE – The last cyber espionage campaign on a large scale
- SNAKE – The last cyber espionage campaign on a large scale
- FireEye 2013 Advanced Threat Report on APTs campaigns
- FireEye 2013 Advanced Threat Report on APTs campaigns
- Uroburos rootkit, is it part of Russian Cyber weapon programme?
- Uroburos rootkit, is it part of Russian Cyber weapon programme?
- Government built malware and cyber weapons will run out of control
- Government built malware and cyber weapons will run out of control
- More than 360 million stolen credentials available on the black market
- More than 360 million stolen credentials available on the black market
- Russia Today hacked, tensions from Crimea to cyberspace
- Russia Today hacked, tensions from Crimea to cyberspace
April 2014 ( View complete archive page )
- Adobe zero-day used in watering hole attack against Syrian dissidents
- FireEye discovered a new zero-day exploit for IE in the wild - Operation Clandestine Fox
- Certificate revocation checks aren't efficient against Heartbleed
- The novelties inside the last critical update for P2P Zeus
- Critical Infrastructure security, is it possible a shared regulatory?
- Ponemon study - SQL Injection attacks too dangerous for organizations
- Unflod Baby Panda, the Chinese malware hit jailbroken iphone
- New iBanking mobile Trojan exploits Facebook platform
- German Aerospace Center hit by serious malware-based attack
- APWG report 2H2013- Analysis of phishing phenomena on global scale
- Reading the Mandiant M-Trends 2014 Threat Report
- Raoul Chiesa – from cybercrime to state-sponsored hacking
- The Extortion is a common practice in the cyber criminal ecosystem
- Heartbleed Bug is a serious flaw in the OpenSSL cryptographic library
- New Zeus trojan variant digitally signed in the wild
- German authorities discovered 18 Million stolen Email accounts
- Waze app can be hacked to display fake traffic jams
- Chinese CCTV reported cases of pre-installed malware on Android mobile
- Reading the Global Threat Intelligence Report (GTIR)
- Philips SmartTV susceptible to serious hack according ReVuln experts
- RSA is accused again to have helped NSA to weaken security products
May 2014 ( View complete archive page )
- Nice Recording eXpress lawful intercept solution is flawed
- Spotify Android app hacked, change password and Upgrade it
- Unrecom phishing campaign hit high-profile entities globally
- Nemanja, a botnet of thousand POSs, Grocery Management and Accounting Systems
- FBI is officially looking for malware development
- Remote code injection in Microsoft, Yahoo and Orange subdomains
- Al-Qaeda is developing new Encryption tools in response to NSA surveillance
- Hackers have stolen files on Ukraine crisis from Belgian Foreign Ministry
- Federal Trade Commission - Watch out to Health and Fitness Apps
- Heartbleed one month later, at least 300k servers are still vulnerable
- Navy sysadmin went on hacking spree at sea
- Orange hacked for the second time in the year, 1,3M records exposed
- RedSocks, An interesting vision on Malware trend in Q1
- Be aware, Apple iOS Data protection doesn't protect email attachments
- Skype stores all application data in a local database in plain text
- AOL suffered a massive Data Breach
June 2014 ( View complete archive page )
- EMOTET the banking malware which uses network sniffing
- Critical flaw in TimThumb plugin menaces the WordPress world
- HackingTeam, new revelations on the surveillance network
- Largest DDoS attack hit PopVote, Hong Kong Democracy voting site
- AT&T suffered a data breach, users urge to change passcode
- Impact of Windows XP End of life on Critical Infrastructure
- Once again Android Smartphone from China with pre-installed malware
- AT&T suffered a data breach, users urge to change passcode
- Fake Versions of World Cup 2014 Apps targeting Android users
- Zeus malware is hard to eradicate, the criminal ecosystem continues to innovate it
- Vodafone admits support to state surveillance
- Databases of personnel at US command in S Korea hacked
- Revealed the spy bases of GCHQ intelligence agency tapping undersea cables
- Gameover Zeus Botnet disrupted by multinational effort
- Hackers threatens major cyber-attack on World Cup 2014
- AV alone is not enough to protect PC from zero-day malware
July 2014 ( View complete archive page )
- Russian Government issued a Tender to crack Tor
- European Central Bank victim of an attempt of cyber extortion
- Nigeria 419 scam targeting business world with RATs
- Gyges, the mixing of commercial malware with cyber weapon code
- Siemens industrial products affected by OpenSSL vulnerabilities
- Cybercrime exploits the crash of Malaysia Airlines Flight MH17
- WhatsApp profile picture: a risky feature? In the mind of a hacker
- Cisco Wireless Residential Gateway Remote Code Execution flaw
- Feds issue advisory on keylogger in hotel business centers
- Chinese Executive charged of hacking on Boeing and other defense contractors
- NightHunter extensive data theft campaign has been active since 2009
- Deep Panda hacking team targeting US experts on Iraq
- Cisco warns on combined spear phishing and exploit attacks
- North Korea doubles units of its cyber army
- APWG report shows the increase of phishing activities in Q1 2014
- NSA XKeyscore targeted Tor Directory Authority servers
- Kaspersky Lab reveals an increase in RDP bruteforce attacks
- Microsoft Seized No-IP Domains, Millions dynamic DNS users affected
- Selfmite, the rare Android worm which spreads itself by sending SMS
August 2014 ( View complete archive page )
- Major cyber attacks hit 5 US banks including JPMorgan
- A dark wing of the intelligence supports the Tor Project
- 900,000 Android Phones Hit by Ransomware in 30 days
- FBI warns healthcare industry on possible cyber attacks
- Operation Arachnophobia, targeted attacks from Pakistan
- Hackers have stolen credit card data from 51 UPS stores in the US
- New malware based attacks hit opponents in Syria and all over the world
- Microsoft confirmed that a faulty patch is causing BlueScreen
- HACIENDA, GCHQ Port Scanning Program on a wide-scale
- Grocery giants ALBERTSONS and SUPERVALU confirmed data breach
- NSA accidentally caused the 2012 Syrian Internet blackout
- The network of USIS compromised by a cyber attack
- F-Secure discovered Xiaomi handset spying on users'data
- Malicious Facebook color changer App infected 10000 Users worldwide
- Russian crime ring amasses over a Billion credentials
- China bans Symantec & Kaspersky from the list of antivirus suppliers
- Al-Qaeda usage of encryption after Snowden leaks (Part 2)
- Zero-day flaws affect Symantec Endpoint Protection
September 2014 ( View complete archive page )
- iFrame based redirection attacks used to monitor Chinese organizations
- FBI concerned about encrypion by default for Smartphones
- Bash Bug is a critical risk to entire Internet infrastructure
- Jimmy John’s has confirmed breach of POS systems at 216 stores
- IT giants Google and Apple enable encryption by default
- Schneider ClearSCADA platform affected by different security flaws
- Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.
- Home Depot confirms data theft for 56 million cards
- Chinese hackers hit several US contractors
- Citadel Trojan targets energy industry in Middle East
- Dyre Zeus variant malware used for corporate espionage
- Treasure Map - Fiveeyes tap into German telco networks to map end devices
- High-Risk flaws affect the NOAA Satellite System JPSS
- AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance
- The Chinese Government runs MitM attack on Google users
- CERT disclosed the list of most popular vulnerable Android apps
- Namecheap accounts compromised using the CyberVor's archive
- Bogus cellphone towers found in the US
- Brazilian cyber criminals targeting home routers
- Alleged iCloud flaw exploited in Naked celebrity hack
- APWG Q2 2014 report, phishing is even more dangerous
- Oil and energy industry in Norway is under attack
October 2014 ( View complete archive page )
- Hackers infiltrated a White House unclassified computer network
- Backoff infections rise up to 57 percent increase in Q3
- Drigo spyware exploits Google Drive in targeted attacks
- Operation Distributed Dragons, thousands of machine compromised worldwide
- Malvertising campaigns hit US military industry to steal secrets and intellectual property
- ICS-CERT states that manufacturing organization compromised for several months
- WAAR report - Web Attacks continue to increase, especially those launched from Amazon servers
- Leaked programming manual inspired development malware for ATMs
- Criminal gangs use Tyupkin malware to steal millions from ATMs
- ATM hacking easily with RM100 chip and a free malware
- Bash bug and risks posed by incomplete patches, discovered other two additional bugs
- FBI identified hackers which stolen intellectual property of Xbox One
- Apple released a patch for the Shellshock vulnerability
- The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?
November 2014 ( View complete archive page )
- Islamic State caught in a cyber-web of its own making
- Cyber Defense Magazine November 2014
- Regin - Highly advanced spying tool discovered by Symantec
- British firm now owned by Vodafone aided GCHQ in wiretapping undersea cables
- The US energy industry is constantly under cyber attacks
- EASE, the concept of self-repairing networks of the DHS
- ISIS keeps getting better at avoiding US surveillance
- State Department network hacked, email system shut down
- The WSJ revealed that the US authorities coordinated by the Department of Justice has been using airplanes to collect Americans' cell phone data
- Internal Internet traffic routed outside Russia by a Chinese operator
- Foreign state suspected of breaching US Postal Service systems
- Manual phishing attacks are the simplest and most effective hacking technique
- Operation Onymous, the joint attack against dark markets in tor
- Apple OS X Yosemite is affected by a serious vulnerability
- China unveils laser defense system that could shoot down small drones in a few seconds
- Drupal community under attack due to a critical SQL injection flaw
- Voxis, the platform for automating rogue credit card charges is available in the underground
December 2014 ( View complete archive page )
- NSA published reports containing declassified compliance errors
- Gmail service has been blocked in China
- Lizard Squad took down again Sony PSN and Xbox Live networks
- Eastern APT group Anunak steals millions from banks
- ISIS operates spear phishing attacks against a Syrian citizen media group
- Anonymous hacked Swedish government email account in retaliation for the seizure of Pirate Bay servers
- TSPY_BANKER Banking Trojan Targets banks in South Korea
- GCHQ launches Cryptoy mobile app to teach cryptography
- UK - A new GCHQ-NCA unit will catch pedophiles in the Deep Web
- POODLE SSL flaw is threatening also TLS Security Protocol
- Stolen Sony certificates used to digitally sign Destover Malware
- A new Variant of POODLE bug biting 10% of Websites Worldwide.
- 93 percent of Government Chinese websites are vulnerable
- Op AURORAGOLD - NSA hacks cellphone networks worldwide
- FBI warns of major malware-based attacks following the Sony Pictures hack
- Sony Pictures data breach may have exposed staff data and much more
- ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS)
- Who is GOP? Is North Korea behind the Sony Pictures data breach?
- Are AnonGhostTeam hacktivists using malware to infect end users?
January 2015 ( View complete archive page )
- Regin and Qwerty keylogger are linked with Five Eyes Intelligence
- Java poses the biggest security risks to PCs in US
- Reading the ENISA Threat Landscape 2014 report
- AT&T short codes exposes users to phishing scams
- 5800 Gas Station Tank Gauges vulnerable to cyber attacks
- Car hacking - Progressive Dongle exposes vehicles to attacks
- Snowden reveals that China stole plans for a new F-35 aircraft fighter
- Chinese Government runs a MITM attack against Microsoft Outlook
- USA and UK announce joint cyber 'war games' to improve cyber defenses
- Anonymous supports FBI in the investigation of the US CENTCOM hack
- Project Zero team has disclosed a new unpatched Windows 8 flaw
- CyberCaliphate group hacked US CENTCOM Social Media Accounts
- Energy Sector - Presented the Cybersecurity Framework Implementation Guidance
- Malvertising, Huffington Post was serving Malware via AOL Ad-Network
- Denmark Plans to Invest $75 Million towards Empowering its Cyber Control
- Sony Pictures hack - US exacerbates sanctions on North Korea
- India blocks 32 Sites to fight the ISIS. Censorship will not stop the terrorism
February 2015 ( View complete archive page )
- Doubts about how CSE monitors Canadian emails to the Government
- The Europol and security giants dismantled the Ramnit botnet
- Lenovo released an automatic removal tool for Superfish adware
- Lenovo sold laptop with pre-installed Superfish malware
- Ali Baba, the APT group from the Middle East
- Carbanak cybergang swipes over $1 Billion from banks
- EU parliament bans the Microsoft mobile Outlook app
- Obama signed a new Executive Order on sharing cyber threat information
- Unknown hackers hit Gas Pump Monitoring Systems in the US
- US Government Launching New Agency for Dealing with Cybersecurity
- 11 percent of mobile banking apps includes harmful code
- GCHQ mass internet surveillance was unlawful, IPT rules
- Cybercrime exploits Anthem data breach in Phishing campaigns
- Target Hackers Hit Third Parking Service
- Data Breach at Anthem Health Insurer could impact million users
- Dyre banking trojan tweaked to spread Upatre malware via Microsoft Outlook
- Cybercrime - UNICRI study analyzed risks for the economy and enterprises
- IC3 and FBI warn about Business Email Compromise aka Wire Payment Scam
March 2015 ( View complete archive page )
- The Installer Hijacking vulnerability exposes 1 of 2 Android users to attack
- Chinese CA issued bogus digital certificates for Google domains
- Some models of Cisco IP Phones vulnerable to eavesdropping
- Operation Woolen Goldfish, a hacking campaign in the wild
- Boeing announced its hack-proof drone
- Cardless ATMs will improve security of cash withdrawal
- Yahoo launches its on-demand password feature
- ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs
- EquationDrug, the hacking platform of the Equation Group APT
- Apple and Microsoft released updates to fix the FREAK flaw
- Xiaomi Mi 4 smartphone with preinstalled malware and much more
- Spam campaign spreads Dridex Trojan via Macros in XML Files
- Snowden reveals New Zealand surveillance Waihopai Base
- Identity Fraud Cost US Consumers $16 billion in 2014, less than in 2013
- Weaknesses in Air Traffic Control Systems are a serious issue for FAA
- How to serve malware by exploiting Blu-ray disc attacks
- Shadow Cloud Services a serious risk for Government Networks
- Twitter is tracking phone numbers to prevent trolls and abuses
April 2015 ( View complete archive page )
- Europol, Italian Police & FBI dismantled a cyber criminal gang
- Booby trapped! Malvertising campaign hit Adult Site xHamster Again
- Russian Hackers accessed President Barack Obama emails
- 48,000 Windows XP PCs are still running at TEPCO ... which are the risks?
- Smart city systems could become a nightmare for security
- The Interpol has recently announced the creation of its own cryptocurrency with the intent to understand the abuses and fight virtual currency crime.
- APT28 Russian hackers exploited two zero-day flaws in wild
- France Televisions hacked and 100,000 contacts stolen
- Redirect to SMB flaw affects all versions of windows
- A global operation took down the Simda botnet
- APT30 behind a long-running cyber espionage campaign
- Great Cannon, the powerful Chinese hacking platform
- How Russians hackers breached the White House unclassified network
- Anonymous collective hit Israel as part of opIsrael 2015
- The Turkish Government banned YouTube, Facebook and Twitter
- Volatile Cedar, the cyber espionage campaign from Lebanon
- NEW APPROACH TO SECURITY OF DATA TRANSFERRED BY MOBILE PHONES AND COMPUTERS
- Thousands of WordPress sites hacked by exploiting a flaw in RevSlider plugin
- British Airways Executive Club members accounts compromised
May 2015 ( View complete archive page )
- Tracking wearable devices could be very easy via Bluetooth Low Energy
- The Phantom Menace, who targeted the oil tankers?
- Yemen Cyber Army hacked principal Saudi Gov networks
- Android Factory reset fails to wipe sensitive user data, million devices at risk
- CareFirst data breach affects about 1.1M people
- Unknown Hackers hit systems at Bundestag
- Are Artificial Pancreas vulnerable to cyber attacks?
- ISIS - Cyber Caliphate hackers are threatening Electronic War
- Is your smartphone being tracked? We asked an expert
- Chinese hackers hit Penn State University, 18K people impacted
- VENOM vulnerability opens millions of virtual machines to attack
- Google Hangouts doesn’t use end-to-end encryption, law enforcement can access it
- Law enforcement warns of Nepal Earthquake Scams
- US SOCOM and The Special Forces to Scrutinize Social media
- Flawed Open Smart Grid Protocol is a risk for Smart Grid
- Australian 19 year-old who hacked Microsoft and US Army is fugitive
- Password for systems at a London rail station revealed during a TV documentary
- Trustwave discovered the first political malvertising campaign
- Thousands Linux and FreeBSD servers infected with Mumblehard spamming malware
- How to exploit flaws in InFocus IN3128HD Projector to hack the host network
June 2015 ( View complete archive page )
- Europol arrested members of a gang behind Zeus And SpyEye
- SEC investigates FIN4 hackers who target publicly traded firms
- Bad Actors behind the Dyre botnet operates like a business
- The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware opening users to cyber attacks.
- NIST releases cyber security guidelines for government contractors
- Hackers targeted the Polish Airline LOT, grounded 1,400 Passengers
- Cybercrime is paying with 1,425% return on investment
- Chancellor Merkel's PC was the first one infected in the Bundestag hack
- Researcher found Wind turbines and solar systems vulnerable worldwide
- OPM data offered for sale on the Dark Web
- OPM hack: White House orders the adoption of best practices
- Apple iOS flaw exploitable to steal user password with a phishing email
- Belgian authorities detained terrorists by intercepting WhatsApp messages
- Syrian Electronic Army, defaced the US Army website
- Eataly NYC confirms data breach, customers card data exposed
- US Air Force located an ISIS command by analyzing a selfie
- Chinese hackers had access to millions records of US workers
- Mac zero-day makes rootkit infection very easy
- Bundestag, the Government confirmed a data breach and data leaks
- Popular Kim Dotcom's domains, seized by the FBI, now in the hands of crooks
July 2015 ( View complete archive page )
- United Airlines reportedly hacked by same APT that breached OPM, Anthem
- A part of an unclassified Pentagon email network taken down over suspicious activity
- Drone Firing Semi-Automatic Handgun, what's next?
- Anonymous's team GhostSec thwarts Isis terror plots
- Free Milano Tool scans for Hacking Team Malware and exploits
- Internal emails reveal Hacking Team is working on a weaponized spying drone
- Incidents at Federal Government Agencies increased more than 1,000 percent since 2006
- UCLA Health hospitals confirmed data breach that involved 4.5 million records
- NSA Releases SIMP, An Open Source Network Security Tool
- The FBI paid Hacking Team to identify Tor users
- Law enforcement arrested dozen people from the Darkode crime forum
- Europol and Spanish police dismantled a very active cyber gang
- Hacking Team supported Italian Special Operations Group with BGP Routing Hijack
- Three UK politicians hacked while using open WiFi networks
- Hacking Team Flash Zero-Day tied to attacks in Korea and Japan
- NYSE, United Airlines, WSJ contemporary down, cyber attacks or incidents?
- A number of vulnerabilities affect IP Enabled AirLive Cameras
- Surveillance firm Hacking Team hacked
- California: who is cutting Fiber-optic cable lines and why?
- MasterCard is testing selfies to replace passwords for online payments
- Citizens Demand "Uber" Privacy
- Hacked Routers exploited to serve the Dyre banking trojan
- OPM suspends e-QIP to patch a severe security flaw
August 2015 ( View complete archive page )
- GitHub Again Hit by a new DDoS attack
- Ashley Madison, who hacked it? The Kreb's opinion
- Be aware enterprises, it's time to block Tor
- Cyber espionage campaign targets India and Tibetan activists
- Who are the Ashley Madison users?
- SS7 flaw allows hackers to spy on every conversation
- ICS-CERT warns for 0-Day vulnerabilities in SCADA systems
- An Italian expert discovered two zero-day flaws in MAC OS X
- Kaspersky accused of sabotage to harm competitors
- US authorities dismantled Insider Trading Ring Nets $100M
- Darkhotel APT group relied also on Hacking Team's exploits
- Carphone Warehouse hacked: 2.4 million customer records at risk
- RollJam, a $30 device to unlock the majority of car doors
- Once again alleged Russian hackers hit the Pentagon computers
- ICANN urges passwords reset due an external service provider breach
- Red Alert: America is Losing The CyberWar!
- Terracotta VPN, the Chinese VPN Service as Hacking Platform
- FDA says healthcare providers to stop using older drug infusion pumps made by Hospira
- A secret NSA map shows successful Chinese attacks
- APT 29 use Twitter to control its Hammertoss data stealer
September 2015 ( View complete archive page )
- Naikon APT Group backed by the Chinese PLA Unit 78020
- OPM stolen data includes 5.6 Million Fingerprints
- Malvertising campaign targeted the Forbes Website, million users at risks
- D-Link firmware accidentally includes Code Signing Keys
- The DUKES APT - 7 years of Russian state sponsored hacking
- Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs
- Hundreds million potential victims of a new advanced malvertising campaign
- Department of Energy hacked 159 times between 2010 and 2014
- Vodafone Australia has hacked a Fairfax journalist's phone
- ISIS hackers violated top secret British Government emails
- Another computer system at the Pentagon has been hacked
- Fiat Chrysler recalls thousands Jeep Renegade SUVs due to hacking risks
- DoJ defines new rules for spying with the Stingray technology
- Dark Web intelligence pro and cons
- Ashley Madison Users victims of extortion and phishing
- Critical OS X flaw could be exploited to steal data from Keychain
- Tango Down, NCA website offline after Lizard Squad attack
October 2015 ( View complete archive page )
- WhatsApp collects phone numbers, call duration, and a lot of metadata
- 15-Year-Old has been identified and arrested for TalkTalk Attack
- Duuzer, a data stealer Trojan targets South Korean organizations
- Germany probes alleged new case of US espionage: Regin malware infected Gov laptop
- TalkTalk announced hackers have stolen 'incomplete' customer bank data
- Wikileaks releases CIA Director John Brennan emails
- The ISIL is trying to hack American electrical power companies
- Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the White House
- US Ports - Cyber attacks can cause the release of dangerous chemicals
- Apple has removed several apps from the official iOS App Store
- MEF – Annual Report 2015 – Payment card frauds
- China arrested hackers responding to a US Government request
- Hacking enterprise wireless Printers with a drone or a vacuum cleaner
- The Smurf Suite - GCHQ can hack your phone with a text message
- Fareit malware avoids detection using a different file hash for each attack
- YiSpecter iOS Malware can infect any Apple iOS device
- Experian's data breach puts 15 million T-Mobile users at risk
- Linux XOR DDoS Botnet delivers potent DDoS attacks
- Are you still using TrueCrypt? Beware of these 2 critical flaws!
November 2015 ( View complete archive page )
- Trident nuclear weapons system could be vulnerable to cyber attacks
- Dell puts users at risk with dangerous eDellRoot root certificate
- TrueCrypt is safer than previous examinations suggest
- Dozens of secret and Top secret databases vulnerable to hack
- EU plans to ban Bitcoin to curb terrorism funding
- Windows Bitlocker disk encryption could be easily bypassed
- Three men charged for the attack on the JPMorgan Chase
- GCHQ and NCA hunting criminals in the dark web
- 200,000 Comcast login credentials available on the Dark Web
- British NCA revealed to have hacking abilities, aka equipment interference
- OmniRat RAT is currently being used by criminals in the wild
- A Fourth Teenager was arrested over TalkTalk data breach
- The surveillance firm Hacking Team is back stronger than before
- How CoinVault or Bitcryptor victims could try to recover their files
December 2015 ( View complete archive page )
- Meet the botnet made up of 12000 Italian devices
- European credit card payment terminals are plagued with serious flaws
- Who planted the Juniper ScreenOS Authentication Backdoor?
- Researcher discovered database containing data of 3.3 million Hello Kitty fans
- Hillary Clinton calls tech companies to create a Manhattan Project for Encryption
- GCHQ Gaffer database goes open source
- Twitter warns victims of state-sponsored attacks
- European Space Agency domains hacked by Anonymous
- The French Gov will not block Tor and Free Wi-Fi
- EU regulation to impose rules on firms to improve cybersecurity
- Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father
- BackStab Malware steals iOS and BlackBerry Backups
- UK ANPR systems are one of the 'world's biggest surveillance systems'
- New malware targeting Linux users
- Black marketplace - 50c buys login for stolen media accounts
- Russia deploys jamming systems in Syria as tensions rise
- Italian intelligence plans to monitor communications through the Playstation
- The Hello Barbie doll, lights and shadows
January 2016 ( View complete archive page )
- ISIS offers hackers up to $10,000 to hack govt websites
- Where's the Breach? or would you like fraud with that burger?
- Israeli Public Utility Authority hit by a severe cyber attack
- Shodan implements a feature to browse vulnerable webcams
- Potentially backdoored AMX equipment being used by US President Obama and US Military
- A new archive of US voting records appeared on the Dark Web
- Ukraine blames Russia of cyber attacks against the Boryspil airport
- Senior Bitcoin developer expects a failure of the currency
- Law enforcement arrested operators behind the MegalodonHTTP Botnet
- Teen hacker Cracka owned head of US intelligence James Clapper
- The German intelligence agency BND resumed surveillance activities with the NSA support
- Juniper will drop a function alleged developed by the NSA for surveillance
- RSA® Conference Ignites Security Industry Discussion and Further Education Initiatives in 2016
- iSight Partners says the Sandworm APT is involved Ukrainian power outage
- Time Warner Cable security breach may have exposed 320K customers
- Zerodium offers $100,000 for bypass Flash Player heap isolation
- Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?
- Mac OS X is the software with most vulnerabilities in 2015
- Discovered a new DB containing more than 56 million records of US Voters
- Microsoft maintains the recovery key of your new PC
- The Ramnit Botnet is back after the law enforcement takedown
February 2016 ( View complete archive page )
- Operation Blockbuster revealed the Lazarus Group Activities
- Operation Dust Storm, hackers target Japanese Critical Infrastructure
- Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center
- Linux Mint was hacked, website served malicious ISO on Saturday
- Linux Fysbis Trojan, a new weapon in Pawn Storm's arsenal
- Hollywood Presbyterian Medical Center taken offline; $3.6M ransom
- Should Apple Backdoor iPhones for the US Government?
- Approximate machine improves the Bitcoin mining by 30 percent
- Carbanak cybergang is back and it is not alone
- T9000 backdoor, a sophisticated malware that spies on Skype users
- Someone has pwned the Dridex botnet serving Avira Antivirus
- Malwarebytes working hard to fix flaws in its antivirus
- Cybersecurity Operational Tests And Assessments - US Defence can't check F-35 data due to insecure systems
- ENISA Threat Landscape 2015, a must reading
- A FOP data dump leaked online, 2.5GB of police contracts and data
- Two thirds of the Android devices are vulnerable to Lockdroid ransomware
March 2016 ( View complete archive page )
- USB Thief, the new USB-based data stealing Trojan
- How to hack surveillance cameras from 70 vendors
- PETYA ransomware overwrites MBR causing a blue screen of death
- The FBI is investigating ransomware-based attack at Methodist Hospital
- Olympic Vision BEC attacks target businesses worldwide with keyloggers
- Buhtrap group stole tens of millions of dollars from Russian banks
- Man behind The Fappening case charged with hacking celebrity accounts
- Dear Donald Trump Anonymous plans to destroy your campaign starting April 1
- The DoJ threatens to force Apple to hand over iOS source code
- A new massive spam campaign is spreading Locky ransomware downloaders
- Typos stopped hackers stealing $1bn from Federal Reserve Bangladesh account
- All current and past Seagate employees victims of W-2 phishing
- KeRanger, the new MAC OS X ransomware that hit Apple users on the weekend
- Anonymous hacked Donald Trump's voicemails
- Real pirates used hacking techniques to raid a shipping company
April 2016 ( View complete archive page )
- Pro-ISIS Hackers issued Kill List Of US Gov personnel
- Dutch police seize the Ennetcom encrypted communication network
- Bangladesh Bank heist gang used malware and could strike again
- Misconfigured MongoDB exposed 93 million Mexican voter records
- Multigrain PoS malware exfiltrates stolen card data over DNS
- The Four Element Sword, weaponized document builder used in APT Attacks
- Lottery security director hacked random number generator to rig lotteries
- Canadian law enforcement obtained BlackBerry Global encryption Key
- British youngster pleading guilty to booter and malware sales
- Security experts shut down the dreaded Mumblehard botnet
- HTTP/2: What does it change and will it eliminate the need for a CDN?
- FBI reveals BEC attacks pilfered $2.3bn from US companies
- Why malware like the Samsam ransomware are so dangerous for hospitals?
- German intelligence Agency BND spied on Netanyahu
- A NIST guide tells enterprises how to secure email systems
- Feds request Judge to review the order to reveal TOR Exploit Code
May 2016 ( View complete archive page )
- Installing rogue apps on iOS devices via SandJacking Attack
- Pastejacking attack relies on your clipboard as an attack vector
- Cyberespionage against RUAG, from Red October to Turla, who is the culprit?
- Criminals steal $13m in three hours from ATMs across Japan
- Lawsuit claims Facebook scanned private messages to make profits
- The hidden information behind 12,000 PoC Exploits shared online
- Hackers can break into a facility by spending $700 on Amazon or eBay
- Malware used in the recent banking cyber heists linked to Sony Pictures hack
- OpIcarus: Anonymous crusade against the banking industry
- CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild
- Twitter closes the access to the Intel Agencies to Analysis Service
- How a modern car thief can steal a vehicle by clicking a button
- Swiss defense department victim of cyber espionage
- The RAF drone fleet will double and will include the new Protector UAVs
- A flaw in the PwnedList service exposed millions of credentials
- Now we know the identity of Satoshi Nakamoto, the Bitcoin inventor
- Draft anti-car hacking law raises concern
- Cisco Talos warns that Tuto4PC installed a Backdoor on 12 Million PCs
June 2016 ( View complete archive page )
- PunkeyPOS might have already stolen millions of payment card numbers
- Fansmitter - exfiltrating data from Air-Gapped devices via fan noises
- Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking
- BadTunnel attack affects all versions of Windows
- GoToMYPC targeted by a very sophisticated password attack
- Adobe patches Flash Zero-Day exploited by ScarCruft APT
- Singapore will isolate Government Computers from the Internet
- CRYPTXXX campaigns, threat actors switch to Neutrino EK
- WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images
- How to recover files encrypted by all Teslacrypt Ransomware variants
- Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs
- Jacob Appelbaum leaves the Tor Project after accusation of sexual misconduct
- FastPOS PoS malware implements a quick exfiltration method
- Power plant ICS threatened by an easy remotely exploitable flaw
- Hacking NTP Servers from Long-Distance with low cost devices
July 2016 ( View complete archive page )
- Is Infocube tied to the Carbanak cybercrime gang?
- Snowden and Andrew “Bunnie” Huang devised the Introspection Engine to avoid surveillance
- Turkish Government Blocks Access To WikiLeaks
- OpenSSH affected by a user enumeration bug
- Android.Fakebank.B inhibits outgoing calls to bank customer services
- Experts published IE Exploit code and crooks added it to Neutrino EK
- Unmasking malware's use of TLS without flow decryption
- PoS systems infected in 1 in 20 Wendy's stores, credit card exposed
- NetTraveler APT still targets European and Russian interests
- Espionage SBDH Toolkit used to target European Countries
- Boffins spotted over 100 snooping Tor HSDir nodes spying on Dark Web sites
- Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices
- Global terror database World-Check leaked online
August 2016 ( View complete archive page )
- FBI flash alert says foreign hackers compromised state election systems
- Apple fixed Zero-Day flaws exploited by nation-state spyware
- Cybersecurity Ventures 2016 Cybercrime Report – Hackerpocalypse: A Cybercrime Revelation
- vBulletin vulnerabilities exposed more than 27 million users' records
- Linux.Rex.1, a new Linux Trojan the creates a P2P Botnet
- 3D models based on Facebook images can fool facial recognition systems
- The US DoE has awarded $34 million in funding to secure the power grid
- Emails among dumps published by Wikileaks includes 300+ malware
- Snowden: NSA Equation Group hack may be a Russian warning
- Oracle MICROS hackers breached five more PoS system vendors
- Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats
- DiskFiltration stealing data from air-gapped networks via acoustic signals
- Hackers could break into billion computers through their monitors
- Cyberwar - The cyberspace is already a dangerous battlefield
- FireEye Report - 33 percent of ICS Flaws had no vendor fixes when reported
- WhatsApp does not properly and physically erase user's deleted messages
- Hackers have stolen 120,000 Bitcoin in Bitfinex security breach
- China 1937CN Team hackers attack airports in Vietnam
- DCCC website redirected donors to a fake contribution page
September 2016 ( View complete archive page )
- Fancy Bear Hackers use a new Mac Trojan against aerospace industry
- Australian Police warns of malware-laden USB drives left in letterboxes
- The leak of NSA hacking tools was caused by a staffer mistake
- A mistake allowed us a peek into North Korea Internet infrastructure
- NIST issues the Baldrige Cybersecurity Excellence Builder cybersecurity self-assessment tool
- Car Hacking - Chinese hacker team remotely hacked Tesla Model S
- GCHQ plans to protect the country with a national firewall
- According to the Akamai Q2 2016 report, the number of DDoS has doubled over the last 12 months
- CVE-2016-6662 - Researcher disclosed a critical MySQL Zero-Day
- CVE-2016-6399 - CISCO disclosed unpatched flaw in ACE products
- Two alleged members of Crackas With Attitude group arrested for hacking US Gov Officials
- Europol announces cyber unit to fight online terrorist propaganda
- Porn Brazzersforum hacked, nearly 800,000 Brazzers Accounts Exposed
- SWIFT discloses more cyber attacks on its bank members and urges more security
- Saudi government facilities hit by cyber attacks, Saudi cyber experts convened
- Lurk cybercrime gang developed, maintained and rented the Angler EK
October 2016 ( View complete archive page )
- LDAP as attack vector could power Terabit-Scale LDAP DDoS Attacks
- Cellebrite digital forensics tools leaked online by a reseller
- Hackers offer loT botnet for $7,500. The recent attack may be just a test
- Cyber Defense Magazine Announces Top 20 Cyber Security Leaders of 2016
- Experts devised a method to capture keystrokes during Skype calls
- Security audit reveals critical flaws in VeraCrypt, promptly fixed with a new release
- NRSC hack - financial data of donors were sent to a Russian domain
- The Mirai botnet is targeting also Sierra Wireless cellular data gear products
- Vera Bradley retail chain notifies customers of data breach
- MITRE will award $50,000 for a solution that detects rogue IoT Devices
- Apple Watches banned from UK cabinet meetings to prevent eavesdropping
- More than 500,000 IoT devices potentially recruitable in the Mirai Botnet
- TeamXRat spreads ransomware via RDP brute-force attacks
- Logical Operations: The Ashley Madison Hack — One Year Later
- Yahoo Data Breach may have affected over 1 Billion users
November 2016 ( View complete archive page )
- Personal data of 134,000 United States Navy sailors leaked
- ESET Crysis decryptor to rescue files encrypted by the Crysis ransomware
- CryptoLuck Ransomware spread through the RIG-E Exploit Kit
- Experts spotted a secret backdoor in Android phones that sends data to China
- Telecrypt ransomware abuses Telegram Messenger’s communication protocol
- CVE-2016-7165 Privilege Escalation flaw affects many Siemens solutions
- Bypassing Two-Factor Authentication on Outlook Web Access
- Malware used to spy Iran’s nuclear negotiations in Geneva
- Critical DOM XSS flaw on Wix.com put million websites at risk
- Google discloses Windows zero-day that has been exploited in the wild
December 2016 ( View complete archive page )
- Moscow wants Apple to unlock iPhone of the killer of the Russian Ambassador
- Yahoo data is for sale on Dark Web, and someone has already bought them
- Russian hacker Rasputin allegedly stole logins from the US Election Assistance Commission (EAC)
- Some versions of Netgear routers remain vulnerable to arbitrary command injection
- Tor Project released an alpha version of the Sandboxed Tor Browser
- UK National Security Strategy, Cyber Security is a top priority
- US Presidential Commission presents recommendations on cybersecurity
- Chinese hackers behind the CNACOM campaign hit Taiwan website
- Russian Central bank loses $31 million in cyber heist
- German politicians fear Russian interference in the next election
- More than 900k routers of Deutsche Telekom German users went offline
- Customers of Liechtenstein banks blackmailed by ransomware
January 2017 ( View complete archive page )
- Latest Dridex Trojan variant uses new tactic to bypass Windows UAC
- Uber pays $9,000 bug bounty payoff for partner firm's vulnerability
- Sage 2.0 ransomware is spreading and demands a $2,000 ransom
- A flaw in the Cisco WebEx Extension allows Remote Code Execution
- Western Union agreed to pay $586 Million to settle fraud charges
- Necurs botnet is back and has started delivering Locky ransomware
- The Carbanak gang is with a new modus operandi, Google services as C&C
- How to remain anonymous online
- New campaign leverages RIG Exploit kit to deliver the Cerber Ransomware
- Shadow Brokers exits releasing another arsenal of tools to hack Windows
- A Second variant of Shamoon 2 targets virtualization products
- ESEA data breach, 1.5 million gamers' records leaked
- Yahoo! Data Breach Didn't Need to Happen...Here's Why...
- French Defense Minister Le Drian warns of cyber attacks during upcoming elections
- Hacker held open MongoDB databases for ransom
- Changing travelers flight bookings is way too easy for hackers
- New variant of the Sundown exploit kit leverages steganography to hide malicious code
February 2017 ( View complete archive page )
- Nispana in association with DNJ Saudi Arabia is excited to announce its 3rd Annual Middle East Cyber Security Summit on the 26 & 27 March, 2017 in Riyadh at the Riyadh Marriott
- US Oil and Gas Industry unprepared to mitigate risks in operational technology (OT) environments
- Ukrainian Cybercriminal who sent Brian Krebs heroin sentenced to prison in US
- The Russian propaganda is scaring European Intelligence and NATO
- German regulators ban the My Friend Cayla doll fearing it is a surveillance device
- Yahoo notifies users hackers are forging "cookies" to take over their accounts
- Operation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal
- Watering hole attacks on Polish Banks Linked to Lazarus Group
- Crooks hacked Polish banks with a malware planted on Government site
- The Slammer worm is back after 13 years to target ancient SQL servers
- 12 InterContinental Hotels Group properties suffer massive data breach
- Russian APT 29 group launched cyber attacks against Norwegian authorities
- Hacking printers exploiting Cross-site printing (XSP) attacks
- Hundreds of thousands, if not over a million Netgear routers open to hack
- Islamic Jihad master hacker pleads guilty to hacking IDF drones in Gaza
March 2017 ( View complete archive page )
- Over 8.3 million live websites using IIS 6.0 are affected by a Zero-Day
- Google hacker found a third flaw in the LastPass password manager in a few weeks
- Top German official said Germany blocked Russian APT28 cyber attacks in 2016
- Data breach - Are you an Android Forums user? Resets your passwords now.
- Machete espionage campaign continues to target LATAM countries
- Once again Three mobile customers in UK experienced data breach
- Kirk ransomware - A Star Trek Themed Ransomware that requests Monero payments
- Global DDoS Threat Landscape Q4 2016 - US, UK and Netherlands top attacked countries
- New MajikPOS Malware targets users across North America
- Flaws in MAC address randomization implemented by vendors allow mobile tracking
- Check Point experts spotted pre-Installed Android Malware on 38 Android devices
- INTERPOL World 2017 builds up momentum with strong support from public and private sectors
- WikiLeaks releases documents detailing CIA hacking tools and capabilities
- A bug in Twitter allowed hackers to access to locked accounts until October
- Talos team spotted a PowerShell malware that uses DNS queries to contact the C&C server
- German foreign intelligence service Spied on Foreign Journalists since 1999
- The Gamaredon Group is back with new weapons in its arsenal
April 2017 ( View complete archive page )
- Linux Shishiga malware, a threat in dangerous evolution
- Europol, European police agencies and private actors dismantled cybercrime ring
- Chinese APTs targeted the South Korean THAAD anti-missile systems
- Karmen Ransomware, a cheap RaaS service that implements anti-analysis features
- Microsoft biannual transparency report - US foreign intelligence surveillance requests more than doubled
- Terror EK rising in the threat landscape while Sundown EK drops
- Cyber Security Chicago to Debut in October 2017
- Symantec confirms that Longhorn group is tied to CIA operators detailed in Vault 7
- Dridex banking Trojan campaign exploited Microsoft Word 0day recently revealed
- Alleged Russian hacker arrested in Spain reportedly over US Presidential Election Hack
- IoT Amnesia Botnet puts at risk hundreds of thousands of DVRs due to unpatched flaw
- Operation Cloud Hopper - APT10 goes after Managed Service Providers
- South Korean users targeted with a new stealthy malware, the ROKRAT RAT
- Phishing campaigns target airline consumers seeking business credentials
- The Strategic CISO: Learning from the Masters of War
- 95,000 job seekers affected by the McDonald's Canada data breach
May 2017 ( View complete archive page )
- FreeRADIUS allows hackers to log in without credentials
- IFINSEC Financial Sector IT Security Conference and Exhibition
- FileSystem NTFS Bug Crashes Windows 7 and Windows 8.1
- Chipotle Mexican Grill Fast-food chain notified customers a PoS malware breach
- New GoAnywhere Release Automates and Secures File Transfers in Cloud and Private Networks
- Europol arrested 27 for jackpotting attacks on ATM across the Europe
- At least 3 different groups have been leveraging the NSA EternalBlue exploit, what's went wrong?
- UIWIX, the Fileless Ransomware that leverages NSA EternalBlue Exploit to spread
- WannaCry Ransomware 2.0 – You Are Not Out Of The Woods Yet!
- Critical SQL Injection CVE-2017-8917 vulnerability patched in Joomla, update it now!
- Bell Canada hacked, 1.9 million customer account details stolen by hackers
- Security experts link WannaCry ransomware to Lazarus Group
- Detection of WannaCry Ransomware Based on Network Behavior
- ManageEngine Makes Privileged Account Management Ridiculously Simple with New UI
- What about WannaCry 2.0? Improvements of the ransomware code would have unpredictable consequences
- NHS Cyber-Attack: Seven Acute Trusts Still Diverting Patients Away from Accident and Emergency Departments
- Massive ransomware attack leveraging on WannaCrypt hits systems in dozen countries
- iCloud Keychain vulnerability allowed hackers to steal sensitive data
- HandBrake Mac software supply chain compromised to spread Proton malware
- Business email compromise (BEC), the 5 billion dollar scam
- Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide
- Carbanak gang makes the headlines again, hackers refined intrusion tactics
- Travel Tech Giant Sabre suffered a Data Breach, traveler data potentially at risk
- Kaspersky Lab APT Trends report, Q1 2017 - From Lazarus APT to StoneDrill
- Lenovo warns of IBM Storwize shipped with infected initialization USB drives
- The GCC cyber security market is booming
- Launch of CyberWISER framework: Monitoring your cyber risks in real time
- 8th Annual Anti Piracy and Content Protection Summit
- 2017 International Cyber Security and Intelligence Conference (ICSIC)
- Tangentia Partners with BlackBerry to Connect, Secure and Mobilize Enterprises in Canada
- INTERPOL World 2017 Congress to lead industry dialogue for a unified approach to combat future crime
- Hacker holds Netflix to ransom over new episodes of Orange Is The New Black
June 2017 ( View complete archive page )
- Notpetya - The Petya variant used in the massive attack is a wiper disguised by a ransomware
- Google Hacker found a new way to bypass Microsoft Windows Defender
- Five Reasons Why You Shouldn’t Miss RSA® Conference 2017 Asia Pacific & Japan
- Company fired an employee, he shut down water utility providers' networks in 5 cities
- 32TB of Windows 10 internal builds and portions of core source code leaked online
- TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers
- Stack Clash vulnerability allows an attacker to execute code as root
- The mighty have fallen: how even the unlikeliest targets are going down to DDoS attacks
- Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software
- NetQuest Enhances Cyber Intelligence Gathering with Industry’s First 100G Coherent Network Visibility Solution
- Pinkslipbot banking Trojan exploiting infected machines as control servers
- Buckle Inc. confirmed credit card breach at its stores
- Is it Legal to Use a VPN?
- 5 Reasons Why MFT Agents May Be Right For You
- Israeli Intelligence spotted IS plans for Laptop Bomb
- Platinum hackers leverages Intel Active Management tools to bypass Windows firewall
- SECURE SWISS DATA LAUNCHES FULLY ENCRYPTED MOBILE APPLICATION
- INTERPOL World 2017 to Showcase the Latest Innovations for Future Security Challenges
- NSA top-secret report details Russian cyber operations days before 2016 election
- Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign
- Insecure Hadoop Distributed File System installs 5 PB of Data
July 2017 ( View complete archive page )
- Forget FTP: 4 Modern Protocols You Should Use Instead
- How to hack a Segway Ninebot miniPRO hoverboard in 20 seconds
- Two CryptoMix Ransomware variants emerged in a few days
- Hacker steals $7 Million in Ethereum from CoinDash in just 3 minutes
- Ashley Madison agrees to an $11.2 Million settlement for a 2015 massive data breach
- NemucodAES ransomware and Kovter trojan bundled in the same campaigns
- New PoS Malware LockPoS emerges in the threat landscape
- MS Patch Tuesday fixes 19 critical issues, including two NTLM zero-day flaws
- US Food Payment Kiosk Vendor Avanti Markets Hacked, Biometric data stolen
- UK Police: Accessing the Darkweb could be a sign of terrorism
- Logical Operations' CyberSec First Responder (CFR-210) Certification Approved as U.S. DoD-8570 Compliant
- Vulnerabilities in pre-installed software expose Dell Systems to hack
- SQL Injection flaw in WordPress Plugin WP Statistics potentially exposed 300,000+ Sites
- FBI hacked a US Darknet shopper who tried to purchase Mail Bomb
August 2017 ( View complete archive page )
- Massive IoT Exploit: More than 1,700 valid Telnet credentials for IoT devices leaked online
- Watch out! Adware spreading via Facebook Messenger
- Fancy Bears release data on soccer players' Therapeutic Use Exemption (TUE) drug use and doping cases
- Enigma platform hacked, hackers stole over $470,000 worth of Ethereum
- Faketoken Evolves and Targets Taxi Booking Apps to Steal Banking Info
- After Westminster attack, now Scottish parliament hit by brute-forcing attack
- CVE-2017-0199: Crooks exploit PowerPoint Slide Show files to deliver malware
- North Korea-Linked Lazarus APT targets U.S. Defense contractors
- MUGHTHESEC, a signed Mac adware that hijacks the victim's browser for profit
- Kenya opposition claims election results manipulated in cyber attack
- Mamba ransomware is back and targets organizations in Brazil and Saudi Arabia
- Is Managed File Transfer Technology Outdated?
- Creator of the Ebury botnet sentenced to 46 months in jail
- Irish electricity transmission system operator EirGrid targeted by a nation-state actor
- Worldwide Business Research Launches InfoSecurity Connect East
- Level Up at CloudSEC 2017: The Premier IT Security Conference in London
- WannaCry Hero Marcus Hutchins pleads not guilty to malware claims
- UK malware researcher Marcus Hutchins accused of creating Kronos Trojan
- OpenAI Gym - A machine learning system creates 'invisible' malware
- DEF CON Voting Village - Hackers easily pwned US voting machines
- Apple removed iOS VPN apps from Chinese App Store in compliance to censorship law
September 2017 ( View complete archive page )
- A high-risk two-years old flaw in Linux kernel was just patched
- China widely disrupted WhatsApp in the country, broadening online censorship
- Phantom Menace or Not, Now is the Time to Check Your DDoS Defenses
- Phantom Menace or Not, Now is the Time to Check Your DDoS Defenses
- Deloitte targeted by a cyber attack that exposed clients’ secret emails
- Iranian cyber spies APT33 target aerospace and energy organizations
- Iranian cyber spies APT33 target aerospace and energy organizations
- Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues
- Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues
- Hackers exploit an undocumented Word feature for user fingerprinting
- Equifax Breach - Exclusive Detailed Analysis by ICIT
- Thousands of Elasticsearch installs compromised to host PoS Malware
- $700 billion National Defense Authorization Act (NDAA) Includes Cybersecurity Funding...Rejects Kaspersky
- Hackers are offering Equifax data for sale, but they are scammers
- The Privacy Imperative
- Toast Overlay attacks, a Cloak and Dagger with No Permissions, fixed by Google
- Hackers can remotely access Smiths Medical Syringe Infusion Pumps to kill patients
- Taringa Data Breach, over 28 Million users affected
- Equifax Breach: Another Challenge to Consumer Rights and Privacy
- US Government website was hosting a JavaScript downloader delivering Cerber ransomware
- FDA recalls 465,000 pacemakers open to cyber attack
- Cyber Criminals leverage Facebook CDN servers to bypass security solutions
- Myth Busters: Debunking Common Cybersecurity Beliefs
- Expert discovered 2,893 Bitcoin miners left exposed on the Internet
- Android Banking Trojan MoqHao targets South Korea users
October 2017 ( View complete archive page )
- IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems
- IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems
- Next Generation Managed Security Service Provider: Herjavec Group
- Next Generation Managed Security Service Provider: Herjavec Group
- Zero Day Malware Discovered: Wonder Botnet
- Proton malware spreading through supply-chain attack, victims should wipe their Macs
- CUTLET MAKER ATM malware offered for 5000 USD on darknet forum
- CUTLET MAKER ATM malware offered for 5000 USD on darknet forum
- BAE Systems report links Taiwan heist to North Korean LAZARUS APT
- BAE Systems report links Taiwan heist to North Korean LAZARUS APT
- Ransomware News: September Wrapup
- Ransomware News: September Wrapup
- 5 NEW CYBERSECURITY TOOLS FOR BUSINESSES
- 10 Tips on How to Get a Job in Cyber Security
- BAE Systems report links Taiwan heist to North Korean LAZARUS APT
- BAE Systems report links Taiwan heist to North Korean LAZARUS APT
- Iranian hackers compromised the UK leader Theresa May’s email account along with other 9,000 emails
- Iranian hackers compromised the UK leader Theresa May’s email account along with other 9,000 emails
- Hyatt Hotels suffered a new payment card breach, the second in two years
- Infosec Innovator Uncovered: Inky Phish Fence®
- Infosec Innovator Uncovered: Inky Phish Fence®
- Embarrassing data leak business data in a public Amazon S3 bucket
- Embarrassing data leak business data in a public Amazon S3 bucket
- FormBook malware used in high-volume distribution campaigns targeting organizations in the US and South Korea
- Microsoft's October Patch Tuesday addresses critical Windows DNS client Zero-Day Flaws tied to DNSSEC
- Microsoft's October Patch Tuesday addresses critical Windows DNS client Zero-Day Flaws tied to DNSSEC
- HPE allowed Russians to review the code of ArcSight software, which is also used by the Pentagon
- Disqus data breach - 2012 incident Exposed details for 17.5 Million users
- Imperva Report Q2 2017- Over 75% of DDoS targets were hit multiple times
- Imperva Report Q2 2017- Over 75% of DDoS targets were hit multiple times
- Four Ways to Empower Your Employees through Security Awareness Training
- Four Ways to Empower Your Employees through Security Awareness Training
- Yahoo hack - All 3 Billion Yahoo accounts were hacked in 2013 attack
- Dream Market dark web drug dealer OxyMonster arrested on way to beard contest
- Vxers abused legitimate VMware binary to spread Banking Trojan Distribution
- Cyber Defense Magazine Announces Top 25 Cyber Security Leaders for 2017
November 2017 ( View complete archive page )
- Kazakhstan-born Canadian citizen pleads guilty to 2014 Yahoo hack, he admits helping Russian Intelligence
- Kazakhstan-born Canadian citizen pleads guilty to 2014 Yahoo hack, he admits helping Russian Intelligence
- U.S. Indicts Chinese hackers for cyber espionage on Siemens and Moody’s
- A new Mirai variant is rapidly spreading, around 100,000 IPs running the scans in the past 60 hours
- Imgur was hacked in 2014, 1.7 million user accounts were compromised
- Imgur was hacked in 2014, 1.7 million user accounts were compromised
- Most PCs Running Windows and Intel Management Engine Easily Remotely Exploited
- Uber Breach of 57M Records Undisclosed For More Than One Year
- Uber Breach of 57M Records Undisclosed For More Than One Year
- A bug in the Android MediaProjection service lets hackers to record audio and screen activity on 77% of all devices
- De-authentication attack on Amazon Key could let crooks to disable your camera
- US retailer Forever 21 Warns customers of payment card breach at some locations
- Bug bounty programs and a vulnerability disclosure policy Hackers allowed Pentagon fix thousands of flaws
- Bug bounty programs and a vulnerability disclosure policy Hackers allowed Pentagon fix thousands of flaws
- DHS - Tests demonstrate Boeing 757 airplanes vulnerable to hacking
- A regular GitHub user accidentally triggered a flaw Ethereum Parity Wallet that locked up $280 million in Ether
- Vietnamese APT32 group is one of the most advanced APTs in the threat landscape
- Vietnamese APT32 group is one of the most advanced APTs in the threat landscape
- Training to Tackle Insider Threats
- Training to Tackle Insider Threats
- Malware signed with stolen Digital code-signing certificates continues to bypass security software
- Measuring Success in Cyber Security
- InfoSec Awards 2018 Submission
- Hacker threatens Canadian University to dump student info unless the university pay a ransom
- Halting Hackers for the Holidays
- Halting Hackers for the Holidays
- iPhone Apps you granted camera access can secretly take photos and record video
- iPhone Apps you granted camera access can secretly take photos and record video
- Vulnerabilities in Google Issue Tracker exposed details about unpatched flaws
- MFT: Still Young and Growing
December 2017 ( View complete archive page )
- Russian Fancy Bear APT Group improves its weapons in ongoing campaigns
- Russian Fancy Bear APT Group improves its weapons in ongoing campaigns
- Mozilla patches five issues in Thunderbird, including a critical flaw
- Financially motivated attacks reveal the interests of the Lazarus Group
- Cyber Defense eMagazine Subscription
- #Backdoor in #Captcha #Plugin poses serious risks to 300K #WordPress sites
- #Backdoor in #Captcha #Plugin poses serious risks to 300K #WordPress sites
- Loapi Android malware can destroy your battery mining Monero
- Loapi Android malware can destroy your battery mining Monero
- RSA Conference 2018
- OCC.GOV WILL REGULATE BITCOINS BY 2020 OR SOONER #BigIdeas2018
- OCC.GOV WILL REGULATE BITCOINS BY 2020 OR SOONER #BigIdeas2018
- North Korea Bitten by Bitcoin Bug
- North Korea Bitten by Bitcoin Bug
- U.S. blames North Korea for the massive WannaCry ransomware attack
- U.S. blames North Korea for the massive WannaCry ransomware attack
- Zealot Campaign leverages NSA exploits to deliver Monero miners of both Windows and Linux servers
- Zealot Campaign leverages NSA exploits to deliver Monero miners of both Windows and Linux servers
- Enhance Cyber Threat Hunting Through Optical Network Analysis
- 19 Million California Voter records held for ransom attack on a MongoDB instance
- 19 Million California Voter records held for ransom attack on a MongoDB instance
- Creepy Cortana - Is She Spying on You?
- Creepy Cortana - Is She Spying on You?
- Trump signed a bill prohibiting the use of Kaspersky Lab product and services
- The OceanLotus MacOS Backdoor Transforms into HiddenLotus with a Slick UNICODE Trick
- Roll Back of Net Neutrality is a Watershed Moment
- Roll Back of Net Neutrality is a Watershed Moment
- A Year in Review: Ransomware
- A Year in Review: Ransomware
- Vietnamese hacker stole security details and building plans from an Australian airport
- ‘Tis the season to prepare your e-commerce business to effectively fight fraud
- HBO hacker linked to the Iranian Charming Kitten APT group
- TeamViewer fixes a flaw that allows users sharing a desktop session to gain control of the other’s PC
- RSA Authentication SDK affected by two critical vulnerabilities, patch it now!
- PayPal-owned company TIO Networks data breach affects 1.6 million customers
- PayPal-owned company TIO Networks data breach affects 1.6 million customers
- VPN: Do You Really Need It? This Will Help You Decide!
- PGP, OpenPGP, and GPG: What They Are and When to Use Them
January 2018 ( View complete archive page )
- Cyber Risk & Insurance: A Game Plan
- Cyber Risk & Insurance: A Game Plan
- Maersk reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack
- Breaking Cyber Security Investment News: Dave DeWalt ... Momentum Cyber
- Breaking Cyber Security Investment News: Dave DeWalt ... Momentum Cyber
- Ransomware Update - Stay Vigilant!
- Ransomware Update - Stay Vigilant!
- New HNS botnet has already compromised more than 20,000 IoT devices
- New HNS botnet has already compromised more than 20,000 IoT devices
- Op EvilTraffic Malware Analysis Report - Tens of Thousands of Websites Infected!
- Linus Torvalds calls the Linux Spectre patches "UTTER GARBAGE"
- Cyber Defense Magazine Media Kit 2018 - Rise Above The Noise
- Learn the Cyber Threat Framework from the ODNI.gov
- A hospital victim of a new SamSam Ransomware campaign paid $55,000 ransom
- Powerful Skygofree spyware was reported in November by Lukas Stefanko and first analyzed by CSE CybSec
- Powerful Skygofree spyware was reported in November by Lukas Stefanko and first analyzed by CSE CybSec
- Four malicious Chrome extensions affected over half a million users and global businesses
- Four malicious Chrome extensions affected over half a million users and global businesses
- Mirai Okiru botnet targets for first time ever in the history ARC-based IoT devices
- Turla APT group's espionage campaigns now employs Adobe Flash Installer and ingenious social engineering
- Lenovo spotted and fixed a backdoor in RackSwitch and BladeCenter networking switches
- Lenovo spotted and fixed a backdoor in RackSwitch and BladeCenter networking switches
- CDM Available on Mobile Platforms in January 2018
- January 2018 Patch Tuesday security updates fix a zero-day vulnerability in MS Office
- Microsoft: Meltdown and Spectre patches could cause noticeable performance slowdowns
- Spear phishing attacks already targeting Pyeongchang Olympic Games
- Cyber Security Job Outlook for 2018 and Beyond
- 5 Cloud Security Best Practices for Your Organization
- Cisco is going to release security patches for Meltdown and Spectre attacks
- Expert publicly disclosed a macOS zero-day that allows local privilege escalation
- Forever 21 confirms Payment Card Breach and provides further info on the incident
February 2018 ( View complete archive page )
- By 2022, Hackers May Get the Upper Hand
- Pyeongchang - Russia's GRU military intelligence agency hacked Olympics Computers
- Pyeongchang - Russia's GRU military intelligence agency hacked Olympics Computers
- 2,000 Computers at Colorado DOT were infected with the SamSam Ransomware
- 2,000 Computers at Colorado DOT were infected with the SamSam Ransomware
- The Global cost of cybercrime jumped up to $600 Billion
- Learn How to Stop Breaches in 2018 with Time-based Security
- Special Report: The Secret War Against the United States
- Special Report: The Secret War Against the United States
- RiskIQ’s Q4 2017 Malvertising Roundup: Malvertising Increased Again in 2017 but is Trending Down
- US Attorney General Sessions Announces New Cybersecurity Task Force
- US Attorney General Sessions Announces New Cybersecurity Task Force
- City Union Bank is the last victim of a cyber attack that used SWIFT to transfer funds
- Researchers spotted a new malware in the wild, the Saturn Ransomware
- Researchers spotted a new malware in the wild, the Saturn Ransomware
- A new variant of the dreaded AndroRAT malware appeared in threat landscape
- A new variant of the dreaded AndroRAT malware appeared in threat landscape
- Knowledge is Power: Confronting the Intersection of Digital Transformation and DDoS
- Knowledge is Power: Confronting the Intersection of Digital Transformation and DDoS
- The 3 “Must Haves” for Improving Any Company’s Security Posture
- UDPOS PoS malware exfiltrates credit card data DNS queries
- UDPOS PoS malware exfiltrates credit card data DNS queries
- Intel releases new Spectre security updates, currently only for Skylake chips
- WordPress Warning: Major Hole - Serious Risk. CVE...
- WordPress Warning: Major Hole - Serious Risk. CVE...
- Special Report: 5G Nationalization or Not?
- More than 1 million worth of ETH stolen from Bee Token ICO Participants with phishing emails
- Special Report: How to Prepare Your Organization for a Security Incident
- Special Report: How to Prepare Your Organization for a Security Incident
- SPECIAL REPORT: Malware Exploiting Spectre & Meltdown Flaws Emerge
- SPECIAL REPORT: Malware Exploiting Spectre & Meltdown Flaws Emerge
- BREAKING NEWS: Is Startup-India Infected? It seems so...
- BREAKING NEWS: Is Startup-India Infected? It seems so...
- SPECIAL REPORT: Defense in Depth is a Flawed Cyber Strategy
March 2018 ( View complete archive page )
- Introduction to Machine Learning (ML) for Cybersecurity
- Cyber Secure IP Video Solution: Credentialed High Assurance Video Encryption (CHAVE®)
- US imposes sanctions on nine Iranian hackers involved in a massive state-sponsored hacking scheme
- Puerto Rico Electric Power Authority (PREPA) hacked over the weekend
- Facebook Privacy Failures and Opportunities
- Supreme Court in Russia ruled Telegram must provide FSB encryption keys
- Department of Energy Cyber Defense Competition April 6-7, 2018
- Uber Self-Driving Car struck and killed a woman in Tempe, Arizona
- Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds
- Hackers tried to cause a blast at a Saudi petrochemical plant
- A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit
- MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers
- Drive-by as a service: BlackTDS
- The 2018 Guide to Finding a Secure File Transfer Solution
- Group-IB supported law enforcement in dismantling Ukrainian DDoS crime gang
- Cryptocurrency Mining Operations Now Targeting Servers
- 77 FACTS ABOUT CYBER CRIMES ONE SHOULD KNOW IN 2018
- The Risks of Crypto-currency Mining Infections
- New Remote Access Trojan (RAT) Discovered
- New Remote Access Trojan (RAT) Discovered
- Microsoft released Windows Updates that include Intel's Spectre microcode patches
- Safeguarding Enterprise and Personal Data in the Age of Disruptive Technologies
- Safeguarding Enterprise and Personal Data in the Age of Disruptive Technologies
- VISA - The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud
- VISA - The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud
- What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks
- What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks
April 2018 ( View complete archive page )
- Worth the Risk: Understanding How Managed Services Impact Cyber Security
- Expert devised a exploit for a Code Execution vulnerability in NVIDIA Tegra Chipsets
- Police shut down the biggest DDoS-for-hire service (webstresser.org) and arrested its administrators
- Google Project Zero hacker discloses a Zero-Day in Windows Lockdown Policy
- Enter to Win a 4 Day Ethical Hacker Online Course by Hacker.House
- CDM Annual #RSAConference Edition eMagazine Now Available!
- CDM Launching Free InfoSec Research Library
- SunTrust unfaithful employee may have stolen data on 1.5 Million customers
- This advanced cybersecurity degree shows why strategy is your best security measure.
- RSA Conference 2018 - An Incredible Show Wrapping Up
- RSAC 2018 - Incredible Show - Innovative Winners!
- aiSIEM: The Smart SIEM with Actionable Intelligence
- Global Threat Intelligence Vendor Landscape for 2018
- Meet a Cybersecurity Leader at the Intersection of Military and Civilian Intelligence
- Android Alert: HiddenMiner Android Cryptocurrency miner can brick your device
- We're Releasing The Global Threat Intelligence Vendor Landscape at RSA Conference 2018
- After Cambridge Analytica scandal Facebook announces Election security Improvements
- Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?
- New ThreadKit exploit builder used to spread banking Trojan and RATs
May 2018 ( View complete archive page )
- At least 90,000 Canadian bank customers may have been affected by two data breach
- GDPR and Beyond: Prepare to Lead Through The Complex Future of Privacy Regulation
- The Cobalt Hacking crew is still active even after the arrest of its leader
- Coca-Cola data breach has affected about 8,000 workers
- Justice Department announces actions to disrupt the VPNFilter botnet
- Tech giants are all working on new Spectre and Meltdown attacks, so-called variant 3 and variant 4
- Chinese researchers from Tencent discovered exploitable flaws in several BMW models
- Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt
- Misconfigured CalAmp server allowed hacker to take over a lot of vehicles
- Cyber Cities Insecurities: Breaking News: Ranking America’s Most Insecure Metros
- The countdown is on — are you and your organization ready for GDPR?
- Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican Banks
- Nethammer - Exploiting Rowhammer attack through network without a single attacker-controlled line of code
- Root Cause Analysis: Phishing Attacks...Solution? Read on...
- CyberDefense.TV - An Upcoming Media Platform - First Peek
- Operation Hotel – Ecuador spent millions on spy operation for Julian Assange
- Rail Europe North America hit by payment card data breach
- Researchers disclosed details of EFAIL attacks on in PGP and S/MIME tools researchers. Experts believe claims are overblown
- The source code of the TreasureHunter PoS Malware leaked online
- Misinterpretation of Intel docs is the root cause for the CVE-2018-8897 flaw in Hypervisors and Oss
- Signal disappearing messages can be recovered by the macOS client
- baseStriker attack technique allow to bypass Microsoft Office 365 anti-phishing filter
- Spotlight - Rising Above The Cyber Noise
- The Seven Stages of GDPR Compliance
- Defending The Digital Frontline
- European Central Bank announced a framework for cyber attack simulation on financial firms
- The Pentagon bans Huawei and ZTE phones from stores on military bases
- FacexWorm targets cryptocurrency users and spreads through Facebook Messenger
- SamSam operators switch tactic and are more focused on targeted organizations
- Innovations in MSSP: Tying Together Tools and Processes
- Some of the world’s biggest crimes go unnoticed, until it’s too late
- Georgia's Little Secret Cybersecurity Hub: Enter Augusta...
- IP Video Hacking is Huge. Get The Best Encryption Solution on the Market
- The critical skills senior leaders need in today’s cybersecurity climate
- ISACA Special Report: State of Cybersecurity 2018
- Necurs Spam Botnet operators adopt a new technique to avoid detection
June 2018 ( View complete archive page )
- Apophis Squad hacker group is allegedly responsible for the DDoS attack against ProtonMail
- Recently discovered RANCOR cyber espionage group behind attacks in South East Asia
- CSE Malware ZLab – A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy
- China Tick APT group targeting air-gapped systems in Asia
- The IoT makes almost anything possible, but it also makes us vulnerable
- Magento credit card stealer Reinfector allows reinfect sites with malicious code
- Red Alert 2.0 Android Trojan available for rent in the underground at $500 per Month
- Shine a Light on App Security
- Hacking more than 400 Axis camera models by chaining 3 flaws
- WARNING SIGNS FOR MANAGING CYBER SECURITY
- DHS, FBI published a join alert including technical details of Hidden Cobra-linked 'Typeframe' Malware
- China-Linked APT15 is still very active, experts found its new malware tracked as 'MirageFox'
- Europol dismantled the Rex Mundi hacker crew, it arrested another member of the gang
- European Parliament decides to ban Kaspersky products because they claim they are malicious
- Just Because You’re Paranoid Doesn’t Mean that Some Thing Isn’t Out to Get You
- InvisiMole Spyware is a powerful malware that went undetected for at least five years
- Are we at a peaceful crossroad or will Cyber War continue, unabated?
- Paladin Cyber Introduces Paladin Browser Protection as Google Chrome Extension, the First-Ever Comprehensive Cyber Protection Toolkit
- Crooks used a KilllDisk wiper in an attack against Banco de Chile as diversion for a SWIFT hack
- HR Software company PageUp victim of a Data Breach, experts fear a domino effect
- Iron cybercrime group uses a new Backdoor based on HackingTeam’s RCS surveillance sw
- 4 Encryption Technologies You Should Use
- The author of the Sigrun Ransomware decrypts Russian victims' files for free
- North Korea-Linked Covellite APT group stopped targeting organizations in the U.S.
- Flaws in Multidots WordPress Plugins expose e-Commerce websites to a broad range of attacks
- US-CERT issued an alert on two malware associated with North Korea-linked APT Hidden Cobra
July 2018 ( View complete archive page )
- Google bans cryptocurrency mining apps from the official Play Store
- 10 Common File Transfer Risks and How to Avoid Them
- Russian APT28 espionage group targets democratic Senator Claire McCaskill
- Kronos Banking Trojan resurrection, new campaigns spotted in the wild
- State of the SOC: How Does Yours Stack Up?
- Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs
- DHS - Russian APT groups are inside US critical infrastructure
- Social Media Dangers: What You Must Know
- Experts believe US Cyber Command it the only entity that can carry out 'hack backs'
- Experts discovered Calisto macOS Trojan, the member of Proton RAT family
- CSE Malware ZLab – Operation Roman Holiday – Hunting the Russian APT28
- Operation Eligible Receiver - The Birthplace of Cybersecurity: Configurations
- ZoomEye IoT search engine cached login passwords for tens of thousands of Dahua DVRs
- Staying in Front of the Everchanging Cybersecurity Landscape
- 2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1
- Spambot aims at targets WordPress sites in World Cup-Themed spam scam
- Facebook faces £500,000 fine in the U.K. over Cambridge Analytica scandal
- Polar fitness app broadcasted sensitive data of intelligence and military personnel
- How to Protect Your Organization from Spear Phishing
- New Rakhni variant could infect systems with either a ransomware or a miner
- Chinese hackers breached into systems at Australian National University ... and are still there
- Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation
- Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation
- Huawei enterprise and broadcast products have a crypto bug. Fix it now!
- The Social network giant Facebook confirms it shared data with 61 tech firms after 2015
- Does your office security system have the power of foresight?
- Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking
- Security Risks of the Instant Gratification Culture
- Data Broker Exactis data breach, the biggest ever, exposes millions of Americans
August 2018 ( View complete archive page )
- Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted
- Android mobile devices from 11 vendors are exposed to AT Commands attacks
- SentinelOne Unveils H1 2018 Enterprise Risk Index Report
- The restaurant chain Cheddar's Scratch Kitchen has suffered a payment card breach
- North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack
- Expert discovered a Critical Remote Code Execution flaw in Apache Struts (CVE-2018-11776)
- Dark Tequila Banking malware targets Latin America since 2013
- 2.6 billion records exposed in 2,308 disclosed data breaches in H1
- Breaking News: Supply Chain Attack Operation Red Signature Targets South Korean Organizations
- Unusual Malspam campaign targets banks with Microsoft Publisher files
- An Australian schoolboy hacked into Apple Servers and stole 90GB of secure files
- Breaking News: NIST Small Business Cybersecurity Law
- Operation Eligible Receiver - The Birthplace of Cybersecurity: Vulnerabilities
- Beyond GDPR: key cyber security concerns
- FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER
- Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!
- DNS Hijacking targets Brazilian financial institutions
- DNS Hijacking targets Brazilian financial institutions
- Some of the world’s biggest crimes go unnoticed, until it’s too late
- Social Mapper - Correlate social media profiles with facial recognition
- Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats
- Ramnit is back and contributes in creating a massive proxy botnet, tracked as 'Black' botnet
- Duo Security created open tools and techniques to identify large Twitter botnet
- A malware paralyzed TSMC plants where also Apple produces its devices
- Breaking Down the Door to Emergency Services through Cellular IoT Gateways
- Russian troll factory suspected to be behind the attack against Italian President Mattarella
- BAE Systems to Develop Automated Cyber Defense Tools for DARPA
- BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats
- Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018
- Are Your File Transfers Compliant with Data Security Laws?
- BlackHat 2018: Easily Hacking Cars, Voting Machines, Satellites and Much More!
- Reddit discloses a data breach, a hacker accessed user data
- The Impact of SOAR on Incident Response Steps
- Facebook reported and blocked attempts to influence campaign ahead of midterms US elections
- Security Industry Association Announces RISE Scholarship Opportunity for Young Security Professionals
- Trend Micro Nurtures Global Cybersecurity Talent With 2018 Capture The Flag Event
September 2018 ( View complete archive page )
- Russian Sednit APT used the first UEFI rootkit of ever in attacks in the wild
- 50 million Facebook user accounts affected by security breach
- Hide and Seek (HNS) IoT Botnet targets Android devices with ADB option enabled
- The Evolving State of Enterprise Security, From Endpoint to Network
- Bitcoin Core Team fixes a critical DDoS flaw in wallet software
- Operator of Scan4You Malware-Scanning sentenced to 14 Years in prison
- Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange
- The Airport Security Nightmare
- Flaw in Western Digital My Cloud exposes the content to hackers
- Breaking News: White House Launches National Cyber Strategy
- New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms
- One year later BlueBorne disclosure, over 2 Billion devices are still vulnerable
- Cyber attack took offline flight display screens at the Bristol Airport
- SPECIAL REPORT: Going Beyond HIPAA Compliance: A Case Study
- New PyLocky Ransomware stands out for anti-machine learning capability
- Microsoft Patch Tuesday updates for September 2018 also address recently disclosed Windows zero-day
- Hacking the Hacker - Free - Time Sensitive Offer
- Mirai and Gafgyt target Apache Struts and SonicWall to hit enterprises
- Patch Tuesday Update
- A growing number of iOS apps collect and sell location data
- Russian citizen behind JPMorgan Chase and Dow Jones attacks extradited to US
- British Airways hacked, attackers stole details of 380,000 customers
- 6 Users to Put On Your Organization’s Security Watch List
- Experts warn of 7,500+ MikroTik Routers that are hijacking owners’ traffic
- Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed
- Critical remote code execution flaw patched in Packagist PHP package repository
- Kaspersky warns of a new Loki Bot campaign target corporate mailboxes
- Some of the world’s biggest crimes go unnoticed, until it’s too late
October 2018 ( View complete archive page )
- IBM buys Red Hat for $34 Billion, it is largest software transaction in history
- SandboxEscaper expert is back and disclosed a new Windows Zero-Day
- UK ICO fines Facebook with maximum for Cambridge Analytica scandal
- Breaking News: Securonix Threat Research: British Airways Breach
- The new Azorult 3.3 is available in the cybercrime underground market
- GreyEnergy cyberespionage group targets Poland and Ukraine
- Expert disclosed a new passcode bypass to access photos and contacts on a locked iPhone
- Hackers Breached into System that Interacts with HealthCare.gov
- Thousands of applications affected by a zero-day issue injQuery File Upload plugin
- Branch.io Flaws may have affected as many as 685 million individuals
- Breaking News: Trend Micro Redefines Endpoint Security with Apex One™
- A Russian cyber vigilante is patching outdated MikroTik routers exposed online
- Ex-NASA contractor pleaded guilty for cyberstalking crimes
- Pentagon Defense Department travel records data breach
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- October Patch Tuesday Update
- APT28 group return to covert intelligence gathering ops in Europe and South America.
- Sony Bravia Smart TVs affected by a critical vulnerability
- DHS issued an alert on attacks aimed at Managed Service Providers
- Cyber Defense Global Edition and Global Awards for 2018
- The ‘Gazorp’ Azorult Builder emerged from the Dark Web
- Operation Eligible Receiver - The Birthplace of Cybersecurity: Privileged User Management
- Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities
- Torii botnet, probably the most sophisticated IoT botnet of ever
- 4 Ways to Protect Your Files from a Data Breach
- Facebook hacked – 50 Million Users’ Data exposed in the security breach
November 2018 ( View complete archive page )
- Marriott Suffers Massive Breach - Affects 500 Million Customers
- Malicious developer distributed tainted version of Event-Stream NodeJS Module to steal Bitcoins
- Going From One Against Many to Many Against Many: The Future of Security Collaboration
- VMware fixed Workstation flaw disclosed at the Tianfu Cup PWN competition
- It's Cyber Monday every day at Regent University's cyber range
- US Government is asking allies to ban Huawei equipment
- US Government is asking allies to ban Huawei equipment
- Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
- How to Improve Security and Efficiency for Your File Transfers
- CarsBlues Bluetooth attack Affects tens of millions of vehicles
- Instagram glitch exposed some user passwords
- Instagram glitch exposed some user passwords
- Cyber Defense Magazine and Yale University partner on scholarship for Yale Cyber Leadership Forum
- WatchGuard Technologies 2019 Security Predictions
- Boffins discovered seven new Meltdown and Spectre attacks
- Operation Shaheen - Pakistan Air Force members targeted by nation-state attackers
- November Patch Tuesday Update
- Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game
- CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild
- Reading the Android Ecosystem Security Transparency Report
- Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide
- U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program
- Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
- Video Data Security. The view from the experts.
- Cutting Through the Fog of More
- Flaw in Icecast streaming media server allows to take off online Radio Stations
- USB drives are primary vector for destructive threats to industrial facilities
- Cyber attack exposes sensitive data about a nuclear power plant in France
- Iran hit by a more aggressive and sophisticated Stuxnet version
- New Data Affirms Cyber Threat for Industrial Control Systems
- 85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections
- Cyber Risk One-Day Workshop for Executives & Senior Leaders
- Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol
December 2018 ( View complete archive page )
- Hackers target financial firms hosting malicious payloads on Google Cloud Storage
- Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale
- Researcher disclosed a Windows zero-day for the third time in a few months
- Special Report: Cybersecurity predictions for SMBs in 2019
- Russia-linked Sofacy APT developed a new ‘Go’ variant of Zebrocy tool
- Twitter uncovered a possible nation-state attack
- Germany' BSI chief says 'No Evidence' of Huawei spying
- Twitter fixed a bug that could have exposed Direct Messages to third-party apps
- Cyber attack hit the Italian oil and gas services company Saipem
- RSA® CONFERENCE ANNOUNCES INITIAL 2019 KEYNOTE SPEAKERS
- News Alert: December Patch Tuesday
- WordPress botnet composed of +20k installs targets other sites
- Risk Management of Third-Party Vendors: The Devil is in the Details
- Evidence in Marriott's subsidiary Starwood hack points out to China intel
- Email accounts of top NRCC officials were hacked in 2018
- Bug Bounty Hackers Bill Introduced into the US Senate
- Ever-Growing Need for Privacy Results in a Boom for Multi-Party Computing Adoption
- New strain of Ransomware infected over 100,000 PCs in China
- Quora data breach: hackers obtained information on roughly 100 million users
- Six Essential Questions about “ePrivacy”
- A CISOs ‘Playbook’: Practice How You Fight
- Moscow's New Cable Car closed due to a ransomware infection
- New PowerShell-based Backdoor points to MuddyWater
January 2019 ( View complete archive page )
- Reading the ENISA Threat Landscape Report 2018
- Authorities shut down XDEDIC marketplace in an international operation
- Cobalt cybercrime gang abused Google App Engine in recent attacks
- Anatova ransomware - Experts believe it will be a dangerous threat
- DHS issues emergency Directive to prevent DNS hijacking attacks
- Federal Shutdown is No Holiday for Identity Thieves
- Armor Detects and Neutralizes 681 Million Cyber Attacks Launched at its Cloud Customers in 2018
- Detecting Persistent Cloud Infrastructure/Hadoop/YARN Attacks Using Security Analytics
- Prioritization to Prediction: Getting Real About Remediation.
- Huge Data Breach Now Uncovered: Collection #1
- DarkHydrus adds Google Drive support to its RogueRobin Trojan
- Four Methods for Encrypting Sensitive Data in a Cloud Environment
- The Inevitability of Cyber Crime
- The CNIL’s restricted committee imposes a financial penalty of 50 Million euros against GOOGLE LLC
- A flaw in vCard processing could allow hackers to compromise a Win PC
- Experts unveil a “to-do” list of pressing cybersecurity challenges for 2019 and further
- Zurich refuses to pay Mondelez for NotPetya damages because it's 'an act of war'
- A Guide to Cybersecurity Conversations For the C-Suite In 2019
- Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
- Security Product Spotlight: datashur Pro - encrypted USB device
- Ironic turn ... Kaspersky Labs helped NSA to catch alleged data thief
- Youngster behind massive data leak of German politicians data
- Overcoming the Cybersecurity Staffing Drought
- JW’s Signature Cybersecurity Conference comes to The George Washington University
- ReiKey app for macOS can detect Mac Keyloggers using event taps
- Dark Overlord hacking crew publishes first batch of confidential 9/11 files
- Experts analyzed the distribution technique used in a recent Emotet campaign
- Your Security Auditing Is Failing You, and Here’s Why
- Facebook tracks non-users via Android Apps
- The Solution to Cyber Workforce Shortfalls
- Do the Math—Today’s Cybersecurity Must Have Artificial Intelligence
- Hackers bypassed vein based authentication with a fake hand
February 2019 ( View complete archive page )
- Cyber Defense Magazine - March Edition - 2019
- Malware spam campaign exploits WinRAR flaw to deliver Backdoor
- ToRPEDO attack allows intercepting calls and track locations on 4G/5G
- How Organizations are Tackling Cyber Challenges: Takeaways from the Cyber security Imperative
- New Data Affirms Cyber Threat for Industrial Control Systems
- What is PII and Why Criminals Want Yours
- Big Data and Cyber Attacks: The Cyber Dragon Awakening
- 4 Reasons Why VPNs are More Than Just Security Apps
- What’s Your Secret – Best Practices for Managing Digital Authentication Credentials
- Welcome to the Biggest InfoSec Show on Earth: Must Not Miss Out! RSA Conference 2019
- On the Frontline – Open Source Software Risk Management Solution
- On the Frontline – Open Source Software Risk Management Solution
- Expert found a DoS flaw in Windows Servers running IIS
- Taking Collaboration Beyond ISACs and IOCs
- North Korea's Lazarus APT targets Russian Entities
- Technology Takeover: How to Secure IoT Environments
- Engineering-based industries are often not very good at cyber security
- How to Be Smarter About Bio-metrics
- The Challenge of Real-Time Cyber Protection
- Cyber security for Kids
- Strength through Simplification: Taming Cyber security Complexity in 2019
- Schneier says: Technology—our biggest asset. And headache.
- What is Genetic Malware Analysis?
- Experts found a Remote Code Execution flaw in WordPress 5.0.0
- Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year
- Application Isolation and Control – A Modern Defense for New Threats
- Can Endpoint Isolation Finally Thwart Cyber attackers?
- New Trickbot module implements Remote App Credential-Grabbing features
- December Patch Tuesday
- A new batch of 127 million records appears in the dark web
- Could Censys serve as a threat intelligence collector?
- Best Practices for Data Protection
- The 5 Most Cringe-Worthy Privileged Data Breaches of 2018
- Mid-Market Businesses, Don’t Think Small about Security
- Automated STIG “Hardening” Finally Comes to Government IT
- RSA Conference: $900 discount—last day for sweet deal!
- Bank of Valletta shut down its operations after a cyber attack
- Shattered! Security in a Fragmented World of Workloads
- Phishing in the Dark: Employee Security Gaps Are Growing
- Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model
- CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web
- Open-Source Code
- Want to Secure Your Endpoints? Go Beyond the Endpoint
- MetaMask app on Google Play was a Clipboard Hijacker
- QuadrigaCX Cryptocurrency Exchange -- Password or Death Fail?
- Thousands of RDM refrigeration systems exposed online are at risk
- 9 Ways to Safeguard Privileged User Accounts and Protect Your Business
- The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense
- 10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider
- Executives Taking the Cybersecurity Wheel at Regent University
- Cyber-security as a Priority in 2019
- Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution
- Five Steps to Least Privilege Success
- Phishing campaign leverages Google Translate as camouflage
- Metro Bank is the first bank that disclosed SS7 attacks against its customers
- Five Strategies to Optimize Cloud Security in 2019
- Operational Excellence: The Key to Federal Agencies’ Compliance
- What’s next for Cyber-security?
- Putting Security in Context
- From HUMINT to Virtual HUMINT
- Overcoming the Cyber-security Staffing Drought
- The Purpose of Neural Networks in Cryptography
- SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM
- QuadrigaCX exchange lost access to $145 Million funds after founder dies
- The Challenges of Endpoint Security
- How to Combat a Terrorist Attack Using Modern Communications
- Best Practices for Balancing BYOD with Mobile Security
- Cyber-security in New York City, the Financial Capital of the United States
- Cyber Attacks: The Biggest Threat for Future Weapons
- Operators of the TheMoon botnet offer it as a service
- Using PAM for Cyber Forensics & Security Breach Remediation―Key to a Safer 2019
- Free eBook: Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time
- Security Have and Have-Nots
- Operation Eligible Receiver 97’s Impact on Ransomware
- Security - Being Proactive vs. Reactive
- IBM experts warn of malicious abuses of Apple Siri Shortcuts
- It's Tax Season...for Cryptocurrency
- Meeting the Threat in 2019: Cybersecurity for Retail Companies
March 2019 ( View complete archive page )
- Operation eligible receiver - the birthplace of cyber security: vulnerabilities
- Top 10 tips for word-press website security
- Local backups may not keep your business safe from ransomware
- Want to protect your online customers? Keep your website safe
- How to protect your business from cyber-attacks?
- Best practices for ddos mitigation in the terabit attack era
- A new AZORult C++ variant can establish RDP connections
- The impact of soar on incident response steps
- 2018 is late but still the right time to bid goodbye to malware prone SMBv1
- Let passwords go extinct
- Norsk Hydro estimates losses between $35M - $41M in the first week after cyberattack
- Hackers raised fake tornado alarms in two Texas towns
- Cyber security tips for business travelers
- The new way to impact opinions and politics
- Transforming cyber security
- Where do I “Sign”?
- Spear-phishing Is The Next Threat After A Data Breach
- Role of Identity and Access Management (IAM) in Cyber Security
- Simplifying Cybersecurity Deployments with Automation
- Operation ShadowHammer - Supply-Chain attack hit ASUS users
- Malware Basics
- Five GDPR Mistakes that Will Put Your Company in Hot Water
- How Do We Get Privacy?
- Packet Capture Technology is Critical for InfoSec and Regulatory Compliance
- Rampart de Troika: A Three-Step Process to Overcome Cyber security's Top Threat
- Cyber criminals are searching for the chink in your armor
- Why Smartphone Security Should Grow Beyond Biometrics
- Cyber Forensics: An Academic Partnership with Pittsburgh Technical College
- From Theory To Practice: 5 Applications Of Threat Intelligence
- 5 Common Incident Response Problems that Automation and Orchestration Can Help Solve
- 5 Common Incident Response Problems that Automation and Orchestration Can Help Solve
- 4 Concrete Ways Threat Intelligence Can Make Organizations Safer
- How SOAR Can Help You Get Amazing Results from Your Security Analysts
- Inadequate Cyber security Hurts Where it Counts the Most
- South Korea - 1,600 guests at 30 motels secretly live streamed
- Thomas Edison: An Inspiration for Cybersecurity Inventions
- EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain
- The Four Most Serious Threats Facing Online Businesses In 2018
- Going Beyond HIPAA Compliance: A Case Study
- Signs That Indicate Your WordPress Site is Hacked
- Google white hat hacker found new bug class in Windows
- Why Your Cybersecurity Strategy Should Include Managed File Transfer
- Cyber Security Statistics for 2019
- Psychological Operations Behind Ransomware Attacks
- Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection
- Where do I “Sign”?
- EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks
- Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?
- Role based access control and best implementation practices
- Service account management (SAM) challenges and best practices
- How do we get privacy?
- Experts uncovered a malspam campaign using Boeing 737 Max crash
- Cyber security as a mandatory rule in this Era
- What recent industry data leaks tell us about CYBER-SECURITY
- How to keep your home devices from being compromised
- Why You Don’t Need (or Want) a SIEM Tool
- Recently fixed WinRAR bug actively exploited in the wild
- What CISOs really want
- Cyber security in the era of Agile software development – Part 1
- Think like a hacker! and other tips to make you cyber resilient
- Breaking down barriers to effective security with user and entity behavior analytics
- Get your organization “Privilege Ready”
- New study reveals widespread security vulnerabilities in popular apps
- DMSniff POS Malware has flown under the radar for at least four years
- 8 Cyber security tips For SMBs
- State of SOAR Report: Security teams feel human capital crunch as alerts grow
- Cyber security awareness month
- Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks
- Some Countermeasures to cyber attacks
- How SMBs can prepare for California’s new data privacy law
- Attack methodologies in practice
- NETSCOUT ANALYSIS: FACEBOOK OUTAGE
- Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits
- March 2019 - Patch Tuesday Analysis
- The safe progress
- 6 Things to check before selecting a cyber security score
- How to internally respond after a breach
- Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders
- Vulnerabilities in car alarm systems exposed 3 million cars to hack
- The Cyber Risk Handbook - Creating and Measuring Effective Cybersecurity Capabilities
- SaaS DNS Security: Are you Protected?
- How Organizations Should Choose a Load Balance for Managing and Securing Application Traffic in the Cloud
- Shattered! Security in a Fragmented World of Workloads
- Software Should Come with a “Nutrition” Label
- Phishing in the Dark: Employee Security Gaps Are Growing
- Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model
- Prioritizing Security in a Multi-Cloud World
- Operation Eligible Receiver - The Birth Place of Cyber security: Configurations
- Why Wi-Fi Hacking Will Persist Despite WPA3
- Want to Secure Your Endpoints? Go Beyond the Endpoint
- Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector
- Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector
- Security have and have-nots
- Five Steps to Least Privilege Success
- The US Must Catch Up to Other Prominent Powers in Cyber warfare Defense
- NSA released Ghidra, its multi-platform reverse engineering framework
- Why threat intelligence is the key to defending against Third party risks
- Why Insider Threats Are One of the Biggest Security Risks
- 2019 Risks in Focus: Cyber Incidents
- Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards
- Schrodinger’s vulnerability
- The Internet of Things Engineering Insights
- Putting Security in Context
- Necurs Botnet adopts a new strategy to evade detection
- New Provisions to China’s National Cybersecurity Law Impose Significant Risk on International Businesses
- Some Important Developments in the Cyber Insurance Industry
- Best Practices for Balancing BYOD with Mobile Security
- Cyber security in New York City, the Financial Capital of the United States
- Cross-site Scripting Is an Underrated Vulnerability
- Are the C-suite and security teams on the same page?
- How to stand be Workforce Ready and Standout with Cyber security Hiring Managers
- Why Bio-metric Data Use Poses Unique Security Risk
- Why We Need to Rip Off the Cyber security Band-Aids
- Data Breaches: Beyond Exposing Identities
- Bringing Shadow IT into the Light with UEM (Unified Endpoint Management)
April 2019 ( View complete archive page )
- Protect your business with layers of defense
- 5 things everyone needs to know about cyber security
- On the clock
- Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites
- Local and state govt. Offices easy pickings for hackers
- OilRig APT uses Karkoff malware along with DNSpionage in recent attacks
- Ensuring SSH Key Management Security
- Know your data
- Information security advice for small medium business
- How to spot fake news?
- Cyber security good practices
- How tech-giants like Facebook and whats-app are affected by gdpr
- Cyber security mistakes that marketing managers usually make
- The phishing as a never ending challenge of today
- Insider’s threats vs. Access management
- Cyber hygiene is everyone’s job
- Choosing the right encrypted USB flash drive for your needs
- Bodybuilding.com forces password reset after a security breach
- The perfect storm driving the growth of ransomware
- Filling the Public Relations Void for Security Innovators
- How consistent security reporting in government could prevent the next wannacry exploit
- Phoebe the Phisher: Will this Cyber-villain Ever be Captured?
- Security Product Spotlight: Aegis Fortress L3
- Digital Transformation Speaker Series Coming to New Hampshire
- Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies
- Russian Twitter bot activity increased in the wake Mueller report release
- Defense by offense
- Aligning Cyber security Effectiveness with Core Business Objectives
- Marcus Hutchins pleads guilty to two counts of banking malware creation
- Quis custodiet ipsos custodes?
- What to look for when selecting an MSSP
- High-Level Strategies for Third-Party Risk Mitigation
- Attacked on All Sides
- Front-line defense against cyber-war
- Here’s How SMBs Can Affordably Protect Themselves
- How Certificate Expiration Led to Some of the Largest IT System Failures of the Last Two Years
- What do Organizations Need to Build a Security Minded Culture?
- Unlocking Your Users’ Digital Identities with a Selfie
- For better protection, stop buying security products
- Attivo Networks and Deception Market Overview
- The Impact of the Marriott Breach and Chinese Mass Surveillance
- Why Major Data Breaches Will Continue in 2019
- Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes
- Fraud Protection and AI in The Financial Markets
- Is Your Encryption Flexible Enough?
- Cyber Investing Summit Returns to NYC on May 16 2019
- Blue Cross of Idaho data breach, 5,600 customers affected
- Integris Software 2019 Data Privacy Maturity Study
- U.S. Army Researchers Identify New Way to Improve Cybersecurity
- The Role of Security Appliances in SD-WAN Adoption
- Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest
- CSIOS Corporation: Scaling New Heights of Cyber security Services
- Zero Trust? Not if you’re Surfing the Web
- Winning The Battle for the Inbox
- Threat Intelligence: Data Driven Security
- Taking the fight to the cyber criminals
- Inspiring Greater Accountability with Improved Security KPIs
- What is a Black Unicorn?
- Apache fixed an important RCE flaw in Tomcat application server
- Five Things You Need to Know About Next-Gen Authentication
- The perfect storm driving the growth of ransomware
- Cyber hygiene is everyone’s job
- Four hidden costs and cyber security risks of sudo
- These hackers have breached FBI-affiliated websites and leaked data online
- Network Traffic Analysis (NTA)
- Limiting the impact of brute force attacks against your WordPress site
- Comparing cyber insurance policies
- How to be intelligent about threat intelligence
- Is the security of block-chain an advantage for online businesses?
- Shine a light on app security
- Rampart de troika: a three-step process to overcome cyber security's top threat
- The impact of usability on phishing: prevention effectiveness
- Why regular testing is important for GDPR compliance
- The next generation of cyber-AI defense and the emerging AI-driven IOT botnet crisis
- There is no silver bullet for cyber security but unified defense is best approach for companies
- Traditional security defenses may prove Inadequate for effective GDPR strategies, warns Aruba
- Minnesota Department of Human Services suffered a security breach
- Cyber defense is all about the offense
- Project Beresheet: Unhackable Lunar Module About To Land on Moon
- Sophisticated TajMahal APT Framework remained under the radar for 5 years
- How GDPR costs could widen the gap between small and large businesses
- Operation eligible receiver - the birthplace of cyber security: configurations
- The art of phishing and how to fight it
- Experts spotted the iOS version of the Exodus surveillance app
- Practices in network security monitoring
- The power of cloud technology: fighting cyber attacks
- Security risks of the instant gratification culture
- Free SFTP Software vs. Enterprise-Level SFTP Software: Which Should You Use?
- Software, hardware and procedural compliance
- How automation can ensure speedy, successful PAM deployment
- Password Managers: Devil’s in the Details
- Why You May Be the Next Equifax or Marriott Type Data Breach
- DNS hijacking campaigns target Gmail, Netflix, and PayPal users
- Finally: A Truly Trustworthy Password Management System
- Managing Enterprise Mobile Security
- HTTPS — what kind of data is not protected by default
- Why changing your mindset on your biggest ICS risk is essential?
- Emerging trends and cyber security best practices for businesses in 2019
- Seven Myths about Security Orchestration
- Ghidra explained
- AWS, The Cloud & Security - 5 Things You Should Know About Before Investing In The Cloud
- New XLoader variant leverage Twitter to hide C2 addresses
- 26k+ Kibana Instances exposed Elasticsearch databases online
- Standardizing Security: Mitigating IoT Cyber Risks
- What is an Information Security Policy Architecture?
- Protecting Open Source Growth in Cyber security through Patent Non-Aggression
- How to Prevent Cyber security Disaster in 2019
- Why Does Expert Knowledge Matter?
- The Missing Link in Supply Chain Security – Trusted Physical-Digital Binding
- The Future of Infosec: Virtualization Will Complement Real-Time Packet Capture
- Network vulnerability assessment for eCommerce solutions
- Investigator told Saudis hacked into Amazon CEO Jeff Bezos' phone
- Four Corporate Email Oversights That Put Your Organization at Risk
- Why You Don’t Need (or Want) a SIEM Tool
- How Cyber Criminals Capitalized on the 2018 Holiday Shopping Season
- Cyber criminals are searching for the chink in your armor
- Navigating the ‘cloudy’ sky
- Millions of Toyota customer records exposed in data breach
- How to assess and audit your risk?
- You can’t stop all malware, but you can stop the damage
- Are you correctly tackling the cybersecurity challenge?
May 2019 ( View complete archive page )
- Checkers double drive-thru restaurants chain discloses card breach
- Cybersecurity facts to focus on in 2018
- Could our web dependency cost us a lot?
- Misaddressed emails were the #1 data security incident reported in 2017
- Research from Trustwave Details New Trends in Cyberattacks
- News aggregator Flipboard disclosed a data breach
- Data Breach Risks and Responses for Business Leaders
- The Security Behind E-Signatures
- Is C-Level Security Talk Resulting in Action?
- MEASURE YOUR SECURITY
- BlueKeep scans observed from exclusively Tor exit nodes
- IIoT Security and the Threats invited by Public Networks
- Top 5 Ways to Combat Insider Threat
- Keep hackers from boarding your network with a Cyber No-Fly list
- Your Guide to Encrypting Files in Linux
- First American Financial exposed 16 years’ worth of personal and financial documents
- SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks
- Computer Bug History – Notable pests from the last 30 years
- SandboxEscaper disclosed 3 Microsoft Zero-Day in 24 Hours
- Attackers on Rampage
- Ahead of the 2018 US midterms, how can we respond to foreign voting interference?
- Snapchat staff used internal tools to spy on users
- Security Forecast: Cloudy with a chance of doom!
- Third-Party Patching
- SSH: The Two-Edged Sword in Your Security Strategy
- Don’t Get Caught by Ransomware
- Tech and IT Companies are Driving Cloud Security Investments
- GDPR Privacy Laws: Ramifications and Possible Interdictions for Open Source Security Vulnerabilities
- Cloud Clout & the Chinese agnostic
- How We Can Secure The Energy Grid and the Smart Home Of The Future
- IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World
- Pentester Syndrome
- Security Remains Top Concern for IBM AIX Community
- Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns
- Cyber-attacks thrive the market for Managed Security Services
- BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment
- G Suite users' passwords stored in plain-text for more than 14 years
- Are your emails safe?
- 4 Areas with a Growing Cyber Risk of Digital Extortion
- Some of the world’s biggest crimes go unnoticed, until it’s too late
- KB4-Con 2019 Trip Report
- The Seven Stages of GDPR Compliance
- New to Cyber Security Risk Management? Start by answering these questions
- Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?
- Data Security in the Digital Era
- Mobile Apps Loaded with Holes Like Swiss Cheese
- Key Considerations for Identity Governance in the Cloud
- 5 Things the Trump Administration Got Right on Cyber security
- 3 Emerging Technologies Impacting Cyber Security
- Regulating Against a Data Breach
- Don’t Leave Vulnerability Management to Chance
- On the Clock
- What can we learn about Cyber from the flu?
- Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs
- 5 Things Everyone Needs to Know About Cyber security
- The case study: cyber camouflage scenario
- A joint operation by international police dismantled GozNym gang
- Cloud Direct Connects: The Best Bet for Cyber Security
- Synthetic identity fraud and social engineering are growing concerns and on the rise
- CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats
- Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks
- The Attribution Problem – Using PAI to Improve Actor Attribution
- Why CIOs/CISO’s Positions Are Becoming More Challenging
- The Hottest Career on the Block
- The Critical Role TAPs Play in Network Security and Resiliency
- WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware
- Is Your Encryption Flexible Enough?
- The Role of Security Appliances in SD-WAN Adoption
- May Patch Tuesday
- Data Sniffing is Threatening Your Personal IoT. Here’s a Workaround
- Security breach suffered by credit bureau Equifax has cost $1.4 Billion
- Why Cyber Defense in the Power Industry is so Unique
- Standardizing Security: Mitigating IoT Cyber Risks
- Over 100 flaws in management and access control systems expose buildings to hack
- Empower your Kid with Cyber security
- 86% of Cyber security Professionals Expect to Move In 2019, there’s One Way to Fight against It
- It’s all about the Logs
- The Privileged Account Security and the Internet of Things
- More than a Buzzword: Survey Reveals Cyber Threat Intelligence Trends
- Two Steps on – One Step Back
- 4 Signs Your Organization is a Good Cyber Attack Target, and What to Do about It
- The Internet of Things Signal Transmission Challenges
- Network Traffic Analysis (NTA)
- LightNeuron, a Turla's backdoor used to compromise exchange mail servers
- Zero Trust Security
- On Security and Privacy, States Are Taking the Lead
- Phishing Awareness - The More They Know, the Less the Threat
- Reflecting on April Patch Tuesday
- Your Security Teams are Destroying Critical Evidence
- Enterprise Insider Threats on the Rise
- Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security Model
- New MegaCortex Ransomware targets enterprise networks
- Backups like The Last Resort
- Simplifying Cyber security Deployments with Automation
- The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them
- Block chain and Cyber Security: Wary Courtship,Or Marriage Made in Heaven?
- SOAR: The Key to Building a Trustworthy Iot
- 8 Cyber security Practices In Health IT Domain That Every Company Should Learn From
- Making Cybersecurity Risk Measurable - The Future is Here!
- 5 Reasons Why Cloud Security Is Important For All Businesses
- Covering Security from Every Angle
- In Today’s Threat Landscape, Choose an Ounce of Prevention rather Than a Pound of Detection
- New Regulations Governing Data Protection – Including the Use of Encryption – Now In Effect In The EU And New York State
- Facebook Extends a Privacy Olive Branch to Users
- Five Red Flags You Have a Cyber Security Insights Problem
- DDOS attack evolution: the power of UDP amplification
- Virtual Private Networks: Checking, Tracking and Breaking
- Deception Technology—Useful Tool or Just More Busywork?
- How Security Automation Mixed with an IT Culture Shift can Prevent Data Leakage from Misconfigured Servers
- Wake-Up Call For Enterprise Resource Planning Users
- Introducing Insider Threat Training - So Critically Important
- Securing Your Code For GDPR Compliance
- ElectrumDoSMiner botnet reached 152,000 hosts
- Could Cryptocurrencies Be A Better And More Effective Way Of The Society's Control?
- USB-Lock-RP Review: Central Control of Device Access to Computers
- Are We Solving The Right Problem?
- Iot Environment Compromising Cyber Security
- Warning Signs for Managing Cyber Security
- Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader
- One in five android apps have numerous known security flaws
- The impact of usability on phishing
- How deception technology helps cios meet the challenges of cyber security
June 2019 ( View complete archive page )
- Why Deception Technology Will Change the Game in Our Favor Against Cyber crime and Breaches
- Reviewing Last Month’s Ransomware
- The 3 “Must Haves” for Improving Any Company’s Security Posture
- 5 Things to Consider while using Unsecured Open Wi-Fi
- Insider Threat Mitigation Training this Summer
- Rootkit Redux
- KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg
- A New Security Approach in the Age of Cyber Warfare
- How To Implement an Effective Vulnerability Management Program
- The Riviera Beach City pays $600,000 in ransom
- Cyber-security in 2018 - The Kosciuszko Institute publishes experts' forecasts
- The State of PKI Management
- Modular Plurox backdoor can spread over local network
- Insider vs. External Threats: The Greatest Threat Lurks Within
- Report: Thousands of Pharmaceutical Records Leaked in Possible HIPAA Violation
- Why AI Is Exactly What the Cyber security Industry Needs
- Bio-metrics: Validation and Authentication with a Selfie
- The server less computing: The pluses and minuses of this very new concept
- A free Decryptor tool for GandCrab Ransomware released
- Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence
- Top IoT app ideas and IoT security enhancement with Blockchain
- Cyber-attacks thrive the market for Managed Security Services
- NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid
- Ensure the safety of your customers' data throughout the holidays
- Vehicle Vulnerabilities
- The Ghost in the Machine
- French authorities released the PyLocky decryptor for versions 1 and 2
- Two Strategies to Get More Value from Your Existing Threat Intelligence Sources
- Resolve Security Issues Involving Bugs with Better QA Strategy
- The Cyber Mafia
- Protecting against Cybersecurity’s Weakest Link: The Human Factor
- Healthcare Data Security
- Knowledge Is Power: Confronting The Intersection Of Digital Transformation And DDOS
- Yes, one USB drive can cause HAVOC
- A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs
- Standby Virtual Desktops: The IT Insurance Policy For Mayhem
- Browser-based Cryptocurrency Miners
- Facial Recognition
- Building a Security Operations Center to Reinforce Trust
- If You Want to Prevent Breaches, Don't Make These Three Security Mistakes
- “Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”
- Demystifying the Source Code vs. Binary Debate
- Smart Home Cyber Security
- SiteLock Research: Businesses See More Effective Website Attacks in Q4 2017
- Don’t let vulnerabilities win: Patch it so it holds
- How to Take Competitive Advantage Using Machine Learning
- 4 Signs Your Organization Is a Good Cyber Attack Target, And What to Do About It
- Network Security Using Honeypots and Deception Technologies
- AV + EDR versus aiSIEM: Good Security is NOT Good Enough
- 5 Keys to Improve Your Cybersecurity
- You’re Guide to Encrypting Files in Linux
- The Foundation Common to Most Security Frameworks: Addressing Configuration Controls
- Is Your Business Cyber Resilient?
- Mitigating the Risks of Multi-Cloud
- The Digital Promised Land is Riddled with Risk
- Don’t Let a Data Breach Cost You $1.4 Billion
- A Vision for Cybersecurity 2019
- Security for Your Holidays
- Proxy vs. API CASB: An Overlooked Choice in Cloud Security
- Cybersecurity Jobs in the Private vs. Public Sector
- Three Cyber Attacks on the Rise According To New Research
- Open Source Intelligence (OSINT): Your Public Frenemy
- How Security Automation Mixed With an IT Culture Shift Can Prevent Data Leakage from Misconfigured Servers
- The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them
- Ways to Protect the System from Cyber Ransomware Attack
- Tens of Million patients impacted by the AMCA data breach
- Making Actual Private Networks A Reality
- The Difference between Consumer and Enterprise VPNs
- Get Cyber Resilient! Join Kevin Mitnick's Live Webinar on OSINT and How it’s Used Against You
- Will U.S. Citizens Wait for a Federal Data Privacy Regulation?
- The ‘BlueKeep’ Vulnerability: Keeping Your Systems Secure
- What to Pay for Cybersecurity Professionals?
- Improving Cyber security Intrusion Detection
- Ransomware: Are We Really Prepared For Cyber-Attacks?
- The Pros and Cons of Open Source Managed File Transfer Software
- ProtonMail denies that it spies on users for government agencies
- Collecting Threat Intelligence in Cyber Defense
- Threat and Incident Response – Closing the Loop in Cyber Defense
- By The Numbers: Defining Risk in Cyber Insurance
- Addressing Challenges in Hybrid Cloud Security
- 2019 Threat Detection Report
- One Phish, Two Phish, Three Phish, Fraud Phish
- 8 Real World Use Cases for SOAR e-book
- Five Cyber Security Best Practices to Follow
- Cyber Security Facts and States For 2019
- Why You Should Always Use A VPN When Connected To Public Wi-Fi
- Departing Employees: A Bigger Threat than Hackers
- Safeguarding Your Organization from Attacks via Your Third-Party Vendors
- Why Federal Agencies Need AIOps
- WMD vs. Cyber Attacks: Similarities Suggesting a Cyber Arms Race
- Password Security - MFA and SSO Explained
- Infection Monkey’s Controlled Chaos in Network Engineering
- Shining a Light on the Dark Web
July 2019 ( View complete archive page )
- LAPD data breach exposes personal info of thousands of officers
- Prolific Dark Web dealer of drugs pleads guilty
- Challenges and Opportunities in Securing the IoT
- Employee training: from the weakest link in a chain to your secret we apon
- How to Train Your Staff on Cyber security
- End User Security Education
- Bootstamp: Useful Tool in Researching Bootloaders
- The link between corruption and cyber defense
- More Ransom project has helped victims to save $108 million of ransom
- German firms BASF, Siemens, Henkel hit by cyber attacks
- A New Approach is Essential in the Battle Against Cyber threats
- Do you know who you’re letting inside your networks?
- Connected Vehicle Apps High Risks
- Dealing with Insider Threats: How to Repair the Weakest Link in Your Network Security
- Southern Oregon University Breach: An Expensive Lesson
- The Noise Before Defeat: A Focus On Cybersecurity Tactics
- Identify the “intrusion kill chain” to stop data breaches in their tracks
- When Phishing Succeeds The Alternate Inbox Method
- Startups Get a Jump on Success with the LaunchPad Technology Accelerator
- Securing V2I & the Future of Intelligent Transportation Systems
- Defensive Measures for Non Profits
- Comodo Antivirus is affected by several vulnerabilities
- Note to HR: InfoSec Applicants are not Necessarily Mainstream
- Common Sense Passwords
- Adapting Security Policies to Fit the Cloud Computing Era
- CERT-Bund warns of a critical flaw in VLC player
- New APT34 campaign uses LinkedIn to deliver fresh malware
- The role of legal regulations in effective proceeding of a financial crime
- A flaw in discontinued Iomega/Lenovo NAS devices exposed millions of files
- Expert was awarded $10,000 for disclosing XSS flaw to Tesla
- Equifax Breach & Why Your Company is Next
- Digital Certificates 101
- Intelligently Developed Assessment for Cyber Training
- 3 Takeaways From The Recent WPA2 Vulnerabilities
- What You Need To Know About Anti Phishing Standards Part 1
- Why You Need a Good Head-Hunter to Help Fight Cyber Crime
- Bio-metric Best Practices
- ‘Tis The Season To Prepare Your E-Commerce Business To Effectively Fight Fraud
- Cyber Resilience in 2019: What to Watch
- A New Approach to Harnessing Machine Learning For Security
- Digital Certificates
- Enhance Cyber Threat Hunting Through Optical Network Analytics
- 9 Ways CEOS Can Promote Cybersecurity
- Business Email Compromise (BEC) In Full Force & Effect
- The Critical Differences between Security Orchestration and Intelligent Automation
- 3 Steps to Create a Culture of Cybersecurity
- Securing the Connected and Autonomous Vehicle
- How to Defend Your Business against a Ransom Driven DDOS Attack
- Report Reveals that Companies’ Biggest Data Security Threat is … Their Own Employees?
- Could Your Reactive Cyber Security Approach Put You Out Of Business?
- Surveying Anti-Phishing Standards – Part 2
- Ransomware: Nothing to Sneeze At
- VPN: Do You Really Need It? This Will Help You Decide!
- Creep Hunters Canada Society
- How to Make Notpetya Not Your Problem
- Does Your Company Have Adequate Security Programs In The Era Of Cyber Attacks?
- Intel addresses high severity flaw in Processor Diagnostic Tool
- How to Become a Cyber Security Professional
- Lack of Infosec & Devsecops
- Seeing Around Corners: Operatively-Sourced Intel Predicted a Ransomware Outbreak
- Malvertising - Advertising, But With A Hook That Hurts, And Hurts Again
- What Is Old Is New Again
- Brazilian "Car Wash" Task Force: Cyber Security Lessons
- Cyber Defense Perspectives For 2018
- White House Release of Vulnerabilities Equities Process Validates Industry Concerns
- US Agency Security Doubts Hinder Move To Hybrid Cloud
- Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time
- Nonprofits Cannot Ignore CyberSecurity
- Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016
- How to secure your network traffic?
- Ten Key Enterprise Endpoint Security Best Practices with Andy Malone
- July 2019 - Patch Tuesday Wrapup
- Securing Software Development without Sacrificing Innovation: Crowdsourcing and the Gig Economy
- Why Cybersecurity Awareness Programs Fall Short?
- Cyberattack shuts down La Porte County government systems
- Making Data a Corporate Asset
- 7 Steps Bad Guys Use to Take Total Control of Your Network
- Risk-Based Roadmaps Set Foundation for Cybersecurity Success
- Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted
- Sodin Ransomware includes exploit for Windows CVE-2018-8453 bug
- US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw
- Interview DOS and Don’ts from a Cybersecurity CEO
- The Pros, Cons and True Impact of GDPR One Year Later
- Every Company’s Cyber Security Requirements Aren’t the Same!
- 6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For
- In Defense of Cyber Offense
- The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward
- Network Traffic Analytics: Helping To Speed up Incident Investigation and Resolution
- Building a Career in Incident Response
- Cyber security Analytics Purposes
- You’ve Been Deceived about Deception Technology
- What Does Breach Prevention Mean?
- Effective Security Training Is the Key to Fighting Cyber Attacks
- How to Manage Your Access Control?
- Ransomware Terrorism: Should We Be Worried?
- New variant of Dridex banking Trojan implements polymorphism
- June Patch Tuesday
- ViceLeaker Android spyware targets users in the Middle East
- Securing the Remote Patient Monitoring Ecosystem
- Broader, More Disruptive, More Critical: Cyber Threats Morphing as 5G, Machine Learning, and IoT Emerge
- Criminals Obtain 2.8 Billion Consumer Records In 2018
- 2019: Why Invest in Secure File Transfer This Year
- Vulnerability in Medtronic insulin pumps allow hacking devices
- Crooks stole millions from Bitrue Cryptocurrency Exchange
- Ensuring the Security & Productivity of an Increasingly Remote Workforce
- Know Who to Call When Phishing Strikes
- Enterprise Social Collaboration: Security Friend or Foe?
August 2019 ( View complete archive page )
- Advanced Malware Detection – Signatures vs. Behavior Analysis
- Multi-Factor Authentication and Mobile Devices
- Veiled Vulnerability
- A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint users
- NK is the new Iraq?
- State Cyber security Regulation: Another Patchwork Approach?
- Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure...But Don’t Forget What’s Beyond the Firewall
- French Police remotely disinfected 850,000 PCs from RETADUP bot
- Lazarus: Data Leakage With Cryptographic System
- 5 ways small businesses can be affected by a cyber security breach
- How context-aware security adds layers of protection to single sign-on services
- What does your 2020 insider threat plan look like?
- Apple released an emergency patch to address CVE-2019-8605 iOS flaw
- Reducing the attack surface: how to empower your staff while keeping your network secure
- The intelligent control systems and their perspectives
- Post-Quantum Information Security
- Part III: Current and Future IoT Threats
- The Risks (and Prevention) of Crime-as-a-Service in Healthcare
- WannaCry ‘Remedies’: The Second Wave of Attacks
- Yet Another Case for Viable Back-Ups and Testing
- Five tips for educating your employees on cyber security
- Mastercard data breach affected Priceless Specials loyalty program
- Is Your Company’s Data Being Sold on the Dark Web?
- The Internet of Things
- Don’t Become Another Data Breach Statistic
- Hacking: Cheaper than a Nando's chicken
- The challenges of interference within modern industrial systems
- WannaCry/Ransomware? Secure your Enterprise Using Blockchain-Enabled Cybersecurity
- The CIO discuss information security leadership
- Don’t be an Easy Target
- 5 Keys to Protecting your Company’s Online Finances
- Why Bio-metrics Is a Security Essential…And So Is Disabling It ASAP
- Understanding the Magnitude of Insider Threats: A Global Epidemic
- Flaw in New Facebook Design Allowed Removal of Profile Photos
- Not Ocean’s 14
- Taming information overload for effective border controls
- The purpose of financial security within a modern society
- The Future of Cyber security: Putting the capital “C” in Community!
- Hacker publicly releases Jailbreak for iOS version 12.4
- The Most Dangerous Computer Viruses That Wreaked Havoc On The World
- Smart TVs
- A Dive into the Dark World of the Internet
- Stopping Breaches with Purple Teams
- How To Prevent Data Leaking On Internet
- Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds
- When It Comes to Ransomware Pay Now
- Issues Associated With Data Backup and Recovery
- 700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom
- US $12 Billion IoT Security Products Market Growing Steadily, Manufacturing & Healthcare Key Sectors
- Data Breach: Steps Not To Take After It
- Cyber security Insurance Policy and Coverage
- What NIST’s Cybersecurity Framework is and why it matters
- Cyber War Of Nation-States
- Detecting The Covert
- Is your desktop telephone secure?
- Convenience Does Not Overrule Common-Sense and Industry Standards
- A flaw in Kaspersky Antivirus allowed tracking its users online
- The 5 Biggest Corporate Data Security Threats
- Data Spill – An Everyday Threat to National Security
- Security vs. Privacy
- Flaws in HTTP/2 implementations expose servers to DoS attacks
- What’s the Matter with S3?
- How to Protect Yourself from Identity Theft Online?
- A Potential Shift in Enforcement Priorities for the FTC
- Flaws in 4G Routers of various vendors put millions of users at risk
- The Need For Centralized Critical Event Management
- From Vulnerable To Vigilant
- Active Intrusion Detection
- Canon DSLR Camera Infected with Ransomware Over the Air
- City of Naples, Florida, lost $700K after a cyberattack
- Crooks turn victims into money mules via confidence/romance scams
- New strain of Clipsa malware launches brute-force attacks on WordPress sites
- Nation State Threats
- Patching the Iron Tail is Easier Said than Done
- Battling the Misconceptions Around Network Security Requirements
- Today’s Cyber Threats Demand Enhanced Strategies and Solutions
- Reducing the Insecure Deserialization Risk
- To Pay or Not To Pay, That Is the Question
- The Role of Certifications for a Cyber Security Professional
- Will Your Wordpress Site Be Breached In 2019?
- Reducing the Occurrence and Impact of Data Breaches through Strong Practices and Procedures
- Privacy Regulations Are Popping Up Everywhere
- Data Manipulation Attacks Difficult To Detect But Preventable
- Facing the Reality of VPN Security Flaws, And How to Overcome Them
- Let’s Come At The Cybersecurity Skills Gap From A New Angle
- Is Your Organization Driving the Getaway Car for Cybercriminals?
- Overcoming Zero Trust Challenges in the Federal Government
- Going for Gold – Why Hackers Are Looking For Active Directory Golden Tickets
- The Dangers of HTTPS: When Secure Is Not Safe
- Stay One Step Ahead Of Hipaa Compliance
- Virtual Private Server Market to Hit US$ 2 Billion by 2025
- The Foundation Common to Most Security Frameworks: Addressing Configuration Controls
- Machete cyber-espionage group targets Latin America military
- The Email Tracking and Fraud Prevention
- Five Ways a Software Defined Perimeter Is Better Than VPN
- The Smart Encryption Procedures and Policies
- Cybersecurity & Your Company
- The Iot Headache and How to Bolster Defenses
- How To Prevent Your Data Loss Using Enclosed Data?
- July Patch Tuesday
- The Top 4 Application Security Defenses You Didn’t Know You Needed
- What Is DNS Hijacking And How Can You Mitigate?
- How Is Machine Learning Helping Cyber Defense?
- 10 Steps to Kicking Off Your Insider Threat Program
- How to Reduce Your Company’s Susceptibility to Hacking
- One of the Greatest Threats Facing the Iot: Router Security
- GDPR
- Security by Design for Mobile Apps
- Bitglass 2019 Cloud Security Report: Only 20 Percent of Organizations Use Cloud Data Loss Prevention Despite Storing Sensitive Information in The Cloud
- Key Highlights from Next Week's Black Hat USA 2019
- Vulnerability Management: Reducing the Remediation Gap
- Is Your Organization Ready For The Windows 10 Migration?
- CISA warns of critical flaws in Prima FlexAir access control system
- Your Enterprise Network: On-Premise, Cloud-Based, And the Transition In Between
- 5 Simple Ways to Keep Your Personal Information Safe Online
September 2019 ( View complete archive page )
- The cloud’s computing: identify – understand – secure
- Cyber Security Fears of Today and Tomorrow
- The security’s challenges of an Internet of Things
- Untethered Power Sourcing Could Hitch Devices to Additional Security
- Hacking the projector at a cyber event
- Ransomware Is the Biggest Online Threat. Learn Who to Protect, or You'll Hate Yourself Later
- Why Cyber Security is Redefining SMEs’ Business Operations on the Cloud
- Why compromised credentials are one of the biggest threats facing businesses today
- US Utilities Targeted with LookBack RAT in a new phishing campaign
- Cyber Security and the Supply Chain: Strengthening the Weak Links
- The challenges of the good incident response strategies
- Addressing the Growing Risk of Personal File-Sharing Apps at Work
- Phishing: A Changing Business Model for a Rampant Problem
- Escaping the Gravitational Pull of Data Insecurity
- Campbell County Memorial Hospital in Wyoming hit by ransomware attack
- How Vulnerable Are You?
- Top 5 Cyber Security Tips Every Internet User Must Consider
- Mirai Botnet
- How to save your critical data using smart backup procedures?
- TortoiseShell Group targets IT Providers in supply chain attacks
- How to survive the cybersecurity expertise shortfall
- THE GLOBAL CYBER SECURITY BATTLE
- Password security: It's like sellotaping your house key to the front door...
- The information sharing methods
- Improve Company Cyber Security While Staying on Budget
- IoT Devices Require Security-First Design
- Tips to Help Boost the Security of Your MySQL Database
- Best Practices in Cyber Security for Businesses
- Three Tips to Avoid Going Phishing
- The Fatal Danger Lurking in Today’s Fortune 500
- The Myth Behind Frequent Password Changes
- Ransomware and the Internet of Things
- HP Inc. Announces Acquisition of Bromium
- Office Depot
- Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications
- CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
- Cybersecurity is in Focus at Inaugural SecureWorld New York Next Week
- New Attack with Seldom Used Vector
- Achieving Digital Trust in a World of Data
- The best practices in dealing with ransomware
- Air APT: State-sponsored entities targeting Airline Industry per NETSCOUT
- Australia is confident that China was behind attack on parliament, political parties
- Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
- This Data is mine, mine, mine, mine.
- Cyber Security the Major Issue of 2019
- Astaroth Trojan leverages Facebook and YouTube to avoid detection
- The Dawn of the DDoS of Things (DoT)
- Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
- The US Treasury placed sanctions on North Korea linked APT Groups
- Tesco Bank
- Nation State Cyber Attacks Emerge from the Shadows
- Why today’s university students pose a massive cyber threat — and what to do about it
- PART II: DEFENDING YOUR AIRSPACE
- Part I: The Anatomy of a Wi-Fi Hacker in 2019
- Time to Get Serious About Internet of Things Cyber security
- Cyber Security Risks on Social Media
- The Human in the Middle
- Phishermen
- NetCAT attack allows hackers to steal sensitive data from Intel CPUs
- Look into my Crystal Ball; let's see what 2020 has in store
- The challenges of an Internet of Things analytics
- Addressing the government data security problem
- Million of Telestar Digital GmbH IoT radio devices can be remotely hacked
- Momentum Cyber Releases 2019 Security Technology Spend Insight Report
- 10 cyber security measures growing companies should implement
- Venafi Survey: Many Organizations Overlook Threats Hiding in Encrypted Traffic
- Best Practices to keep your Home WiFi Secured
- Police dismantled Europe’s second-largest counterfeit currency network on the dark web
- Infosecurity North America and Cyber Defense Magazine Partner - Honoring US Veterans...
- Multi-factor Authentication Implementation Options
- How Real-Time Asset Intelligence Enables Full Posture Control
- The Dangers of the Integrated Home/Workplace
- Armor’s Black Market Report Finds Hackers Selling Cash for Pennies on the Dollar, Credentials for RDP Servers (a Popular Entry Point for Ransomware), and Articles of Incorporation
- Belarusian authorities seized XakFor, one of the largest Russian-speaking hacker sites
- Stop! Vulnerable Software
- Top Ten Requirements for Managed Security Services Providers
- Server less Security Analysis: The Best Practices on How to Enforce Them
- Protecting Your Business against DDoS Attacks Requires Simple Best Practices
- CVE-2019-15846 Exim mail server flaw allows Remote Code Execution
- Voice Commerce Calls for Built-in Security
- Ready Position - Proactive Teams are Helping Solve the Cyber security Skills Shortage
- Cyber security Checklist: How to Keep Your Business Secure
- Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
- How the Internet of Things Could Compromise Online Security
- Data Risk Report Shows Lack of Security across Industries
- Security-scorecard – Risk Assessment Made Simple!
- 5 Key Differences between Software and Hardware Vulnerability Mitigations
- Do You Know What That App Is Doing?
- Ransomware: A Municipality’s Achilles Heel
- New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom
- XKCD forum data breach impacted 562,000 subscribers
- Understanding Application Risk Management
- Have You Asked your eDiscovery Vendor
- Attracting and Retaining Staff for a Fusion Center
- Artificial Intelligence-Driven Situational Awareness
- Ways to Protect Sensitive Data Online
- Security Research as an Anti-Malware Secret Weapon
- Zao app went viral but raised serious privacy concerns
- Hands-On Network Forensics ($20 Value) FREE For a Limited Time
- US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf
- Preventing Business Email Compromise – a $300 Million Dollar Problem
- The Need of Automatics and Control in Incident Response
- Top 5 Questions about the Capital One Data Breach
- Expert found Russia’s SORM surveillance equipment leaking user data
- August Patch Tuesday
- Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
- 7 Steps to Protect Yourself Against Corporate Spear Phishing
- Anatomy of a Single Request Attack: The #1 Invisible Security Threat
- Why “Cloud Security 101” Isn’t So Simple After All
- What Other Companies Can Learn from Facebook’s $5 Billion Fine
- Conversation Marketing Security Pitfalls and Best Practices
- Better Safe than Sorry: How to Protect Yourself While Shopping Online
- 5 Most Disastrous Ransomware Attacks of the Last Decade
- 4 Industries Being Hurt by Counterfeit Materials (And How to Spot Them)
October 2019 ( View complete archive page )
- The ways of responding to a terrorist encryption
- Facial Recognition: Killing the Password One Photo ID at a Time
- Raccoon info stealer already infected 100,000+ worldwide
- Three Key Business Lessons From The Founder of a Big Data Security Company
- No One Likes Passwords, So Why Are We Still Using Them?
- Improving Quality And Security With Binary Analysis
- Adding Efficiency to Security
- The packet analysis as a helpful way of network monitoring
- Layered Security
- How Can You Tell If Your WordPress Site Has Been Hacked?
- Cybersecurity: Why Your Cell Phone is Your Weakest Link
- Lock, stock and two smoking … access controls
- Belfast - The New Hotbed for Cybersecurity Talent
- How to Protect Your PC and Keep Your Data Safe with MiniTool ShadowMaker
- Czech Police and Intelligence agency dismantled Russian Spy ring on its soil
- Understanding Bluetooth and its role in the Internet of Things
- Privacy and Security Issues in Autonomous Cars
- 5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
- E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
- OPEN ACCESS APIs
- SecurityScorecard – Risk Assessment Made Simple!
- The Evolving Landscape of Cybersecurity for SME’s
- NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches
- The implementation of SOCs with the SMEs
- Best Practices for Remote and Branch Office Data Protection
- Hundreds of millions of UC Browser Android Users exposed to MiTM attacks
- How a Cyber Attack Could Kill Your Website – Permanently
- Ransomware: Not Your Typical Threat
- Securing the Hybrid Cloud: What Skills Do You Need?
- How to protect an enterprise from physical attacks
- Threat intelligence collection in a developing world
- How to Defend Against the Next DDoS Attack
- Wi-Fi Security Worries and the Critical Nature of Classification
- How to investigate a cyber crime scene?
- It’s the Industry Titans Against the Federal Deities
- Cryptocurrency miners infected more than 50% of the European airport workstations
- Chinese-speaking cybercrime gang Rocke changes tactics
- Mission Critical Security and the Rise of the Private Internet of Things
- Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
- Business Risk Intelligence: A Necessity Across the Enterprise
- Charming Kitten Campaign involved new impersonation methods
- The anniversary of EMV roll-out: criminals are anxious to beat the system
- The independent wireless networks
- 2 Sure Ways To Prevent Cyber Crime
- A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns
- Security Orchestration is more than Automation
- A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
- The IoT Boom and The Implications on Our Home Networks
- SIM cards used in 29 countries are vulnerable to Simjacker attack
- Software Forensics: Beyond the Law
- The reasons to catastrophical events within a critical infrastructure
- The Great Tech Transfer—A Success Story in Innovation
- Startups with Information Security in Mind at Startup
- The Trials and Errors of Security Operations Revealed in New Report
- What Can You Do To Secure Your Data In The Cloud?
- Data Availability: Laying the Digital Foundation for a More Intelligent Business
- Six Reasons to Rethink Secure Remote Access
- Cybersecurity Awareness Is Not Just For October!
- How to Prevent Ransomware
- Even NASA Has Issues!
- High Schools Are Not Exempt From Attack
- Hackers compromised Volusion infrastructure to siphon card details from thousands of sites
- Hackers continue to exploit the Drupalgeddon2 flaw in attacks in the wild
- US will help Baltic states to secure Baltic energy grid
- Genesee County Systems Pwned!
- Investing In SIEM: How Your Business Can Improve Threat Detection and Response
- Configuration Mistakes That Provide Field Days for Hackers
- HiddenWasp and the Emergence of Linux-based Threats
- The Myths You Shouldn't Believe
- Still Misconfiguring Servers…
- WatchGuard’s New Ruggedized Appliance Brings Simplified, Enterprise-Grade Security to Harsh Industrial Environments
- New Research Shows Cyberattacks on SMBs Are Increasing Globally
- Effectively Using Email Authentication Standards for Stronger Message Integrity
- Security in Orbit: Addressing the Current State of Satellite Security
- DDOS as a Distraction
- Cyber Defense Global Awards Coming to IPEXPO Europe 2019
- UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities
- Dutch police shut down bulletproof service hosting tens of DDoS botnets
- The Malware Research Insights
- Benefits of Conducting Crown Jewels Analysis
- Crowdsourced Security and the Gig Economy
- Cybersecurity and Compliance 1-2-3? Start With G-R-C
- The Correlation Between Psychological and Cyber Warfare
- Slow Response Times to Blame for Phishing Attack Success on Organizations
- Why You Should Use a VPN When Working With Cryptocurrencies?
- The Need for a Better Protection of Small Businesses
- Security Researchers Discover Massive Trend in Phishing Scams
- The Storm after the Breach
- Hybrid Offenses as a Current Security Concern
- Going Beyond Compliance: What New Regulations Mean For Your Company
- Ten hospitals in Alabama and Australia have been hit with ransomware attacks
- September Patch Tuesday
- How Consumers Can Protect Their Identity after a Data Breach
- Employers Catch One-Year Break on Impending California Privacy Law
- Why Zero Trust is the Right Security Model for the Cloud
- Nodersok malware delivery campaign relies on advanced techniques
- Cloud Security Essentials — Session Monitoring
- Speculative Execution and SWAPGS
- Hidden and High Priority Threats
- Flexibility in Vulnerability Management: Why it’s Essential
- Phishing’s Effective Usage
- 10 Ways to Protect Your Data at Work
November 2019 ( View complete archive page )
- The Weakest Points in Your Network are Your People
- Two unpatched RCE flaws in rConfig software expose servers to hack
- Chicago student charged with writing code to spread ISIS propaganda
- New NextCry Ransomware targets Nextcloud instances on Linux servers
- 5 Simple Ways to Protect Your Smartphone from Cyber Attacks
- DDoS-for-Hire Services operator sentenced to 13 months in prison
- Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild
- 3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
- Applying Security Across Heterogeneous IT Systems
- What Does A Cyber Security Consultant Do?
- A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
- The Importance of Cybersecurity When Dealing With Online Customers
- How to Stop Cybersecurity Attacks before They Start
- Deceptively Simple Detection
- Sprint Beta Testing 5G Smart City in Georgia
- Stressing Security Teams
- RSA Conference 2020 Introduces the RSAC Engagement Zone
- New Cybersecurity Trend: Hackers Impersonating Other Hackers
- Software Defined Perimeter Deep Dive & Required Implementation Readiness
- ZoneAlarm forum site hack exposed data of thousands of users
- Secure Data Is Gold: U.S. Immigration Options for Cybersecurity Experts
- Cybersecurity Essentials for Small and Medium Businesses
- Major ASP.NET hosting provider SmarterASP hit by ransomware attack
- The Platinum APT group adds the Titanium backdoor to its arsenal
- How Cybersecurity Became a Major Issue for Your Business’ SEO
- How to Erase Data from Mobile Devices: Four Common Misconceptions
- Here’s How You Can Secure Your App from Cyber Attacks
- Sovereign Cyber Effects Provided Voluntarily by Allies (SCEPVA)
- How Organizations Can Best Avoid GDPR Fines through Continuous Compliance
- 10 Best Tips for Using Metasploit to Harden Your Network
- In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
- How to Keep Your Customer’s Credit Card Information Safe
- So, Ya Wanna Be A Pen Tester, Huh?
- Simple Ways SMBs Can Protect Themselves against Cyber-Threats
- Mysterious DarkUniverse APT remained undetected for 8 years
- 'Light commands' attack: #hacking #Alexa, #Siri, and other #voiceassistants via Laser Beam
- How to Suggest Your Manager to Invest into Cyber Defense?
- How to Address the Top 5 Human Threats to Your Data
- Are Financial Services the Golden Goose for Cybercriminals?
- The Social Engineering Methods and Countermeasures
- Intelligent Automation Week
- Talk About a Disaster
- Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking
- Avoiding Misinformation for Content Moderators
- CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks
- How to Build an Effective Insider Threat Program: Part II, Technology
- How to Build an Effective Insider Threat Program: Part I
- Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
- From Guards to Detectives: Evolving the Junior Security Analyst Role
- The Intersection of Artificial Intelligence and Cybersecurity
- 3 Must-Do Tasks to Make Vulnerability Management Useful in Today’s Environments
- Why Do You Need a DMZ Gateway?
- Detrimental Ransomware Effects
- Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
December 2019 ( View complete archive page )
- Out-Smarting the Cybersecurity Skills Shortage
- Watch out, hackers are targeting CVE-2018-0296 Cisco fixed in 2018
- Maze Ransomware operators threaten victims to publish their data online
- Why Insider Data Breaches Will Continue in 2020
- The Growing Costs of Cyber Attacks on UK Small Businesses
- Multifactor Authentication & The Sobering Reality for Organizations Without It
- Automatic for The SOC People
- The Only Recession in Cybersecurity
- The Email Security Challenges
- The Rise of Cybercrime-As-A-Service
- The Perspectives Of The 5th Industrial Revolution
- The Internet Got Safer In 2019: A Cybersecurity Year in Review
- Happy Holidays! 2020 Around the Bend...
- The Blockchain And Wireless Technologies
- Despite Spending an Average of $18.4 Million on Cybersecurity Solutions, Organizations still get Breached
- Emotet distributed by emails posing as German authorities, BSI warns
- The Security Challenges of Robotic Process Automation—A Primer
- How to Become a Cybersecurity Sleuth?
- Cyber Safety Tips for The Holidays
- Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
- Visibility and Anomaly Detection in The Age of Iot
- Microsoft fixes CVE-2019-1458 Windows Zero-Day exploited in NK-Linked attacks
- 2020 - The Year of The Weaponized Internet
- Adobe Offers CCF - an Open Source InfoSec Standard
- Government Agencies Are Prime Target for Cyberattacks
- BeyondTrust Cybersecurity Predictions for 2020 & Beyond
- Protecting Against Modern Cyberattacks
- Ohio Election Day cyber attack attempt traced Russian-Owned Company
- 6 Benefits of Using MFT for Encrypted File Transfers
- Persistent Cybersecurity Industry Challenges: Salary Survey Finds Parity Gaps for Gender, Diversity and Trouble Sustaining Work-Life Balance
- Oh, my! PerCSoft’s Irony
- Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
- TrueDialog database leaked online tens of millions of SMS text messages
- TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
- Hacker House exposes major security flaw in US election voting machines
- RSA Conference Announces Initial 2020 Keynote Speakers
- RevengeHotels campaign - crooks target the hospitality industry
- Facebook and Twitter warn of malicious SDK harvesting personal data from its accounts
- 3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
- Data of 21 million Mixcloud users available for sale on the dark web
- 8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
- January
- February
- March
- April
- May
- June
- July
- August
- September
- October
- November
- December
January 2020 ( View complete archive page )
- A vulnerability in Zoom platform allowed miscreants to join Zoom meetings
- Blocking Privilege Escalation Attacks in Amazon Web Services (AWS)
- For the second time in a few days, Greek Government websites hit by DDoS attacks
- Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack
- Jeff Bezos phone was hacked by Saudi crown prince
- OP Glowing Symphony - How US military claims to have disrupted ISIS 's propaganda
- OP Glowing Symphony - How US military claims to have disrupted ISIS 's propaganda
- Mitsubishi Electric discloses data breach, media blame China-linked APT
- Hack the Army bug bounty program paid $275,000 in rewards
- How To Drive the AI Value Proposition in Insurance with Cutting-Edge Analytics and Innovation
- P&N Bank data breach may have impacted 100,000 West Australians
- McAfee is Cutting Through the Jargon, and Empowering Consumers
- Moving Network Security to The Cloud
- The Decade Ahead for Cybersecurity
- US Military Veterans Targeted By Online Scams
- More Spending Won’t Solve Your Hardest IT Challenges In 2020 And Beyond. Here’s What Will.
- Anomaly Detection Is the Next Cybersecurity Paradigm
- Fraud: A Look Back At 2019 And What to Expect in The New Year
- How To Build A Career In Cyber Security
- Seven Security Predictions For 2020
- Getting PKI Right
- Iot Security and Privacy
- Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
- Encryption Is Key to Guarantee Data Is Anonymous
- The Ultimate Guide to SSL/TLS Decryption
- 8 Common Types of Small Business Cyber Attacks
- How to Know If Someone Is Watching You on Your Camera
- How To Mitigate The Risks Of Remote Desktop Protocol
- TikTok security flaws allowed hijacking any account
- What’s the Security Misconfiguration Antidote? Automation.
- China-based Bronze President APT targets South and East Asia
- Reuters Events’ Insurance AI and Innovative Tech Summit Returns to Chicago in 2020
- The Dark Truth of Insider Threat
- Firewall Sandwich: A Hacker’s Delight, Unless…
- Federal Depository Library Program Govn agency breached by Iranian hackers
- Best Practices for Building A Comprehensive Cyber Risk Management Program
- Really, Imagine a Day Without Water
- Browser Extensions Are a Leaky Vessel for Phishers to Exploit
- How to Stay Safe on Public Wi-Fi Networks (Detailed Guide)
- Expert finds Starbucks API Key exposed online
- Hindsight Is 2020: Three Security Visions for The Start of The New Decade
- A Ryuk Ransomware attack took down a US maritime facility
- Security experts disclosed Wyze data leak
- It’s Time for A Tough Conversation About Trust
- New Security Report Highlights Trends in Mid-Market Business Malware