Yearly Archives: 2018
How to Improve Security and Efficiency for Your File Transfers
Security continues to be top of mind for those in the business of keeping their company’s data out of the wrong hands. To learn where organizations are in their security […]
CarsBlues Bluetooth attack Affects tens of millions of vehicles
The CarsBlues attack leverages security flaws in the infotainment systems installed in several types of vehicles via Bluetooth to access user PII. A new Bluetooth hack, dubbed CarsBlues, potentially affects […]
Instagram glitch exposed some user passwords
Instagram has suffered a serious security leak that might have exposed user’s passwords, revealed The Information website. Instagram notified some of its users that it might have accidentally exposed their […]
Cyber Defense Magazine and Yale University partner on scholarship for Yale Cyber Leadership Forum
Legal, technology, and business professionals in need will have once in a lifetime opportunity to apply for full-tuition scholarship to attend intensive 3-day program Cyber Defense Magazine (CDM), in partnership with […]
WatchGuard Technologies 2019 Security Predictions
“Cyber criminals are continuing to reshape the threat landscape as they update their tactics and escalate their attacks against businesses, governments, and even the infrastructure of the internet itself,” said […]
Boffins discovered seven new Meltdown and Spectre attacks
Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient execution. In January, white hackers from Google Project Zero disclosed the vulnerabilities that […]
Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
Security firm Cylance has uncovered a sophisticated state-sponsored campaign, tracked as Operation Shaheen, against the Pakistan Air Force. According to the experts the campaign was carried out by a nation-state […]
November Patch Tuesday Update
This Month’s Breakdown on Latest Updates from Microsoft and Adobe by Chris Goettl, director of product management, Security, Ivanti I can’t believe it’s November already. My wife is a Christmas […]
Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game
Cyberattacks affect the lives of everyone, from business owners required to safeguard assests and data to children growing up with tablets in their hands. It’s a reality reinforced daily with […]
CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild
Experts at Volexity discovered that a recently patched remote code execution flaw (CVE-2018-15961) affecting the Adobe ColdFusion has been exploited in the wild. Security experts from Volexity reported that attackers in the wild are […]
Reading the Android Ecosystem Security Transparency Report
According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to 0.06% in Pie Google published the first Android Ecosystem Security Transparency Report that […]
Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide
Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic through China. Security researchers Chris C. Demchak and Yuval Shavitt revealed […]
U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program
The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the Air Force 3.0. The United States Air Force launched earlier […]
Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data. The flaws were discovered by researchers Carlo […]
Video Data Security. The view from the experts.
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as […]
Cutting Through the Fog of More
An overheard conversation between a software vendor and a security professional sheds light on a growing problem in the evolving battle to secure critical enterprise data and information. The vendor, […]
Flaw in Icecast streaming media server allows to take off online Radio Stations
Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast of online radio stations. Icecast streaming media server is affected […]
USB drives are primary vector for destructive threats to industrial facilities
USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published on by Honeywell, malware-based attacks against industrial facilities mostly leverage […]
Cyber attack exposes sensitive data about a nuclear power plant in France
A cyber attack on a French firm Ingerop allowed attackers to access confidential documents related to nuclear power plant plans in France. The hacker stole more than 65 gigabytes of […]
Iran hit by a more aggressive and sophisticated Stuxnet version
Iran’s strategic network was hit by a new destructive and sophisticated version of the Stuxnet cyber weapon, the Hadashot TV reports. According to the Hadashot TV, Iran’s strategic network was hit by […]
New Data Affirms Cyber Threat for Industrial Control Systems
Recent CyberX report finds that plain-text passwords, direct internet connections and weak anti-virus protections place industrial control systems at risk for cyberattacks by Phil Neray, VP of Industrial Cybersecurity, CyberX […]
85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections
Ahead of the 2018 US midterm elections, sellers are flooding the cybercrime underground markets with data from voter databases. Experts at cybersecurity company Carbon Black found tens of different state voter databases available for […]
Cyber Risk One-Day Workshop for Executives & Senior Leaders
Regent University is Setting the Standard in Cyber Training & Education Cyber Risk One-Day Workshop for Executives & Senior Leaders Friday, Nov. 16, 2018 | 7:30 AM – 3:30 […]
Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol
Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. Security expert Antonio Pirozzi, director at ZLab malware lab at Cybaze […]
IBM buys Red Hat for $34 Billion, it is largest software transaction in history
IBM announced it is going to buy the open source company Red Hat for $34bn with the intent to enhance its cloud offerings. This is the biggest tech merger in history involving […]
SandboxEscaper expert is back and disclosed a new Windows Zero-Day
The security researcher SandboxEscaper has released the proof-of-concept exploit code for a new Windows zero-day, Windows users are now exposed to attacks. The security researcher using the Twitter handle @SandboxEscaper is back and has released the […]
UK ICO fines Facebook with maximum for Cambridge Analytica scandal
Facebook has been fined £500,000 by the UK’s Information Commissioner’s Office (ICO) for the Cambridge Analyticaprivacy scandal that exposed data of 87 million users. The announcement was made by the UK’s […]
Breaking News: Securonix Threat Research: British Airways Breach
The data breach suffered by British Airways earlier this year affected around 380,000 customers and resulted in the theft of customer data including personal and financial details. The attack was […]
The new Azorult 3.3 is available in the cybercrime underground market
A new version of the Azorult info-stealer appeared in the wild, it is able to steal more data, including other types of cryptocurrencies A new version of the Azorult info-stealer appeared in the wild, […]
GreyEnergy cyberespionage group targets Poland and Ukraine
Security researchers from ESET published a detailed analysis of a recently discovered cyber espionage group tracked as GreyEnergy. Security experts from ESET published a detailed analysis of a recently discovered […]