Trojan Source attack method allows hiding flaws in source code
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by […]
Trustwave released a free decryptor for the BlackByte ransomware
Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover their files. Researchers from Trustwave’s SpiderLabs have released a decryptor that can […]
Sinclair TV stations downtime allegedly caused by a ransomware attack
A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group broadcast television company. TV stations owned by the Sinclair Broadcast […]
Is the Edge Really Secure?
By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught security professionals anything it’s that the most secure network is the one […]
Application Modernization and Other Best Practices of Securing Legacy Infrastructures
By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance […]
Dutch police warn customers of a popular DDoS booter service
Dutch police warn customers of a distributed denial-of-service (DDoS) website of stopping using the service to avoid prosecution. Dutch police warn customers of a booter service, abused to carry out […]
Being Mindful of Communication Security
The potential risks of communication APIs and CPaaS and secure vendor selection criteria. By James Ryan, Director of Information Security, BISO, IntelePeer The pandemic accelerated the demand for various things, […]
Olympus US was forced to take down computer systems due to cyberattack
Olympus US was forced to take down IT systems in the American region (U.S., Canada, and Latin America) following a cyberattack. The medical technology giant Olympus was forced to shut […]
58% of all nation-state attacks in the last year were launched by Russian nation-state actors
Microsoft revealed that Russia-linked cyberespionage groups are behind the majority of the nation-state cyber attacks on US government agencies. Microsoft revealed that most of the cyber attacks on US government […]
Modern Times, Old Prejudices
The Hacker Era By Jordan Marcus Bonagura The century of constant acceleration Twenty-first century, more than a century of human evolution and great changes, a century of constant acceleration. Everything […]
How to Close the Security Gap Between Identity and Access Management (IAM) and Shared Accounts
By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s underground (a.k.a. The Tube) have been warned to “mind the gap” when […]
Source Code Protection Market
Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are […]
Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability […]
Rethinking Ransomware Resiliency
Did you know an organization is hit with a ransomware attack every 11 seconds? As the global attack surface grows every day, and with everyone’s security perimeter now everywhere and […]
Port of Houston was hit by an alleged state-sponsored attack
Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack allegedly orchestrated by a nation-state actor. One of the major US ports, […]
Cybersecurity experts’ advice: how to become cyber-resilient [Live Webinar] Sept 23, 2021
Cyber Defense Magazine predicts: by 2025, cybercrime will cost the world $12 trillion annually. Today, cyber threats are no longer limited to computers. Anything with an electronic pulse is at […]
HTML Smuggling: A Resurgent Cause for Concern
By Vinay Pidathala, Director of Security Research, Menlo Security Cybersecurity is never straightforward. While defense techniques, technologies, policies and methodologies continue to evolve at pace, such defenses often trail in […]
Apple fixes actively exploited FORCEDENTRY zero-day flaws
Apple released security patches to fix two zero-day vulnerabilities in iOS and macOS that are actively exploited in attacks in the wild. Apple rolled out security patches to fix a […]
New SOVA Android Banking trojan is rapidly growing
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain. Researchers from cybersecurity firm ThreatFabric have spotted in the […]
Offense Activities Sharing in Criminal Justice Case
By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need to be deeply explored and investigated by the case management team and […]
Why Your Hospital Network Needs an IoT Security Policy
By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security problem that has existed since its inception. From the Mirai botnet that […]
TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide
The financially motivated TeamTNT hacking group expanded its arsenal with new tools used to target thousands of victims worldwide. Researchers from AT&T Alien Labs uncovered a new campaign, tracked as Chimaera, […]
Keeping Health Records Safe from Cyber Criminals
By Dexter Caffey, Founder and CEO, Smart Eye Technology The healthcare industry is currently one of the most lucrative targets for hackers. A recent report by a mobile security company […]
Considering Collateral Intrusion in Digital Forensics
Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of digital evidence contained on the personal devices of suspects, victims, and witnesses […]
FBI IC3 warns of a spike in sextortion attacks
The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of 2021 that caused $8M losses. The FBI Internet Crime Complaint Center (IC3) […]
Combatting Industry Burnout by Building Resilient Security Teams
By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. Catalyzed by the shift to an anywhere-work environment during COVID-19, attack surfaces […]
Time to Act: How Real-Time Analytics Can Help Stop the Cyber Kill Chain
Access to Real-Time Contextualized Information through In-Memory Computing Can Help Security Teams Spot Evolving Threats Before It’s Too Late By Dr. William Bain, CEO and Founder of ScaleOut Software In […]
Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach
By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a matter of when, not if, they will fall victim to a cyberattack. […]
New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies The threat landscape is an erratic and ever-evolving beast. While it knows no master, its behavior is broadly directed by the host […]
CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed vulnerability in Microsoft Azure Cosmos DB. The U.S. Cybersecurity and Infrastructure Security […]