CDM Featured Whitepapers

Defending Against Data Breach

Linoma

Are Your Information Security Investments Performing?

Redscan

Knowns & Unknowns

IKANOW


News

PunkeyPOS might have already stolen millions of payment card numbers

Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might…

Fansmitter – exfiltrating data from Air-Gapped devices via fan noises

Fansmitter is a new acoustic data exfiltration method devised by a group of researchers…

Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

A coalition of tech groups asked the Congress to roll back changes to Rule…

BadTunnel attack affects all versions of Windows

A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects…

GoToMYPC targeted by a very sophisticated password attack

A number of users are experiencing problems during logging into GoToMyPC because Citrix reset…

Adobe patches Flash Zero-Day exploited by ScarCruft APT

Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by…

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants’ work computers from the Internet…

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on…

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their…

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery…