Yearly Archives: 2018
Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities
More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of […]
Beyond GDPR: key cyber security concerns
GDPR has now been in force for over two months and has brought with it a whole new approach to data privacy. Although the idea of protecting peoples’ personal data […]
FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER
by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article The practice of threat intelligence (TI) is gaining momentum, helping organizations of all […]
Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!
Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score of 9.9, On Friday, Oracle released security patches to address […]
DNS Hijacking targets Brazilian financial institutions
Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]
DNS Hijacking targets Brazilian financial institutions
Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]
Some of the world’s biggest crimes go unnoticed, until it’s too late
As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]
Social Mapper – Correlate social media profiles with facial recognition
Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles across different social networks. Security experts at Trustwave have released Social Mapper, a […]
Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats
WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group chats. WhatsApp, the most popular messaging application in the world, […]
Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet
Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by Ramnit operators. Security researchers at Checkpoint security have spotted a massive proxy botnet, […]
Duo Security created open tools and techniques to identify large Twitter botnet
Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security […]
A malware paralyzed TSMC plants where also Apple produces its devices
A virus has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the plants where Apple produces its devices A malware has infected systems at several Taiwan Semiconductor […]
Breaking Down the Door to Emergency Services through Cellular IoT Gateways
If configured incorrectly, cellular IoT gateways can give attacker access to critical infrastructure, threatening human life in ways only Hollywood has conceived. by Justin Shattuck, Scott Harvey, Sara Boddy & […]
Russian troll factory suspected to be behind the attack against Italian President Mattarella
The Russian shadow behind the attack on Italian President Mattarella, a coordinated attack via Twitter involved hundreds of profiles inviting him to resign. Cybersecurity experts and Italian media believe that the […]
BAE Systems to Develop Automated Cyber Defense Tools for DARPA
By combining advanced machine learning and cyber-attack modeling, BAE Systems’ unique solution intends to automatically detect and defeat advanced cyber threats that could currently go undetected The U.S. Defense Advanced […]
BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats
NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 2018 NETSCOUT Threat Intelligence Report, offering globally scoped internet threat intelligence together with the analysis of our […]
Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018
Momentum Cyber is proud to release our Cybersecurity Mid-year Review for 2018. The mid-year report examines 1H’18 cybersecurity transactions and identifies trends that are impacting the dynamic and rapidly evolving cybersecurity landscape. […]
Are Your File Transfers Compliant with Data Security Laws?
It can be challenging to keep up with ever-changing compliance requirements. This year alone, PCI DSS released an update that applied to most organizations in card-processing industries, and the GDPR […]
BlackHat 2018: Easily Hacking Cars, Voting Machines, Satellites and Much More!
Black Hat USA now taking place August 4-9, 2018 at the Mandalay Bay Convention Center, offering the largest lineup to date. Deeply technical, hands-on Trainings led by the information security […]
Reddit discloses a data breach, a hacker accessed user data
Reddit is warning its users of a security breach, an attacker broke into the systems of the platform and accessed user data. Reddit is warning its users of a security […]
The Impact of SOAR on Incident Response Steps
How automation and orchestration affect NIST’s framework for incident response by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security As cybersecurity incidents such as phishing scams, ransomware attacks, and user […]
Facebook reported and blocked attempts to influence campaign ahead of midterms US elections
Facebook removed 32 Facebook and Instagram accounts and pages that were involved in a coordinated operation aimed at influencing the midterm US elections Facebook has removed 32 Facebook and Instagram accounts and […]
Security Industry Association Announces RISE Scholarship Opportunity for Young Security Professionals
$30,000 IN RISE SCHOLARSHIPS AVAILABLE TO HELP IN REACHING PROFESSIONAL DEVELOPMENT AND EDUCATIONAL GOALS SILVER SPRING, Md. – Applications are now being accepted for scholarships offered through the Security Industry Association (SIA) RISE […]
Trend Micro Nurtures Global Cybersecurity Talent With 2018 Capture The Flag Event
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced its fourth annual Capture The Flag (CTF) competition, which invites teams from around the world to demonstrate […]
Google bans cryptocurrency mining apps from the official Play Store
Google has updated the Play Store Developer Policy page to ban mobile mining apps that mine cryptocurrencies using the computational resources of the devices. Due to the surge in cryptocurrency […]
10 Common File Transfer Risks and How to Avoid Them
Have you ever caught yourself saying one of the following? “We don’t have an IT department, so I FTP from my desktop.” “I don’t need special software to transfer files; […]
Russian APT28 espionage group targets democratic Senator Claire McCaskill
The Russia-linked APT28 group targets Senator Claire McCaskill and her staff as they gear up for her 2018 re-election campaign. The Russian APT group tracked as Fancy Bear(aka APT28, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM), that […]
Kronos Banking Trojan resurrection, new campaigns spotted in the wild
Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the recent months. The infamous Kronos banking Trojan is back, and according […]
State of the SOC: How Does Yours Stack Up?
How does your company stack up against the state of the security operations center (SOC)? In its inaugural report on the topic, next-generation SIEM provider Exabeam surveyed a range of […]
Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs
BlackHat is expanding its community centric programming, developed to continue its service to the wider InfoSec industry. Over the past few years, Black Hat has made strategic steps in welcoming […]