News

Justice Department announces actions to disrupt the VPNFilter botnet

The Justice Department announced an effort to disrupt the VPNFilter botnet of hundreds of thousands of infected…

Tech giants are all working on new Spectre and Meltdown attacks, so-called variant 3 and variant 4

Yesterday AMD, ARM, IBM, Intel, Microsoft and other major tech firms released updates, mitigations and published security advisories for…

Chinese researchers from Tencent discovered exploitable flaws in several BMW models

A team of security researchers from Chinese firm Tencent has discovered 14 security vulnerabilities in several BMW…

Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt

UNDERSTANDING THE FUTURE OF CYBERSECURITY When you finish reading this article, and I recommend you read it…

Misconfigured CalAmp server allowed hacker to take over a lot of vehicles

Security researchers discovered that a misconfigured server operated by the CalAmp company could allow anyone to access account…

Cyber Cities Insecurities: Breaking News: Ranking America’s Most Insecure Metros

Cybersecurity in the City: Ranking America’s Most Insecure Metros is a first-time report issued by Coronet, a…

The countdown is on — are you and your organization ready for GDPR?

With all eyes on privacy rights, forward-looking businesses are re-examining their social media, e-commerce and data mining…

Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican Banks

The head of the Mexican central bank, Alejandro Diaz de Leon announced this week that hackers were…

Nethammer – Exploiting Rowhammer attack through network without a single attacker-controlled line of code

Nethammer attack technique is the first truly remote Rowhammer attack that doesn’t require a single attacker-controlled line of code…

Root Cause Analysis: Phishing Attacks…Solution? Read on…

Stopping the #1 Source of Exploitation:  Spear Phishing in Depth Again, Inky® receives another award, two years…

Show Buttons
Hide Buttons