Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Latest Content
Page 1 / 2   >   >>
New Fix for jQuery Vulnerabilities
Larry Loeb  
4/24/2019   Post a comment
A security patch has been made for jQuery to mitigate 'prototype pollution.'
Networks in Danger as Global BGP Routing Table Reaches Capacity
Larry Loeb  
4/23/2019   1 comment
The Internet is going to run out of address space sometime this month.
Over 500 Million Chrome iOS Sessions Hijacked in Massive Malvertising Campaign
Larry Loeb  
4/22/2019   5 comments
Confiant has spotted the known threat actor eGobbler back in action.
Russian Hacker Group TA505 Found to Be Attacker of US Financial Firms
Larry Loeb  
4/19/2019   4 comments
Israeli-based Cyberint has found evidence of remote access Trojans being used in attacks on financial entities in the United States as well as worldwide.
Wipro Gets Phished to Gain Access to Clients
Larry Loeb  
4/18/2019   1 comment
Sources say that the company was being used as the start of 'digital fishing expeditions targeting at least a dozen Wipro customer systems.'
Servers Discovered With Multiple Malware Families, Staged & Ready to Launch
Larry Loeb  
4/17/2019   1 comment
Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.
Warning: VPN Application Vulnerabilities Found
Larry Loeb  
4/16/2019   6 comments
That enterprise-grade virtual private network might not be as private as you think.
Who Built the 'Taj Mahal'?
Larry Loeb  
4/15/2019   3 comments
While the sophistication of the malware suggests that it is the product of a nation-state, it bears none of the code fingerprints of any known nation-state hacker group.
IoE: The Internet of Espionage
Joe Stanganelli  
4/12/2019   1 comment
As employees live their lives across an increasingly IoT-enabled landscape (with devices often installed discreetly and with hidden functionalities), enterprise security is threatened by outside factors it cannot control.
New Vulnerabilities Found in WP3 WiFi Standard
Larry Loeb  
4/12/2019   2 comments
Two researchers have made mincemeat of the new WPA3 certification.
Majority of Enterprise Firms Lack Active Incident Response Plans
Larry Loeb  
4/11/2019   Post a comment
Report found that 77% of respondents indicated they do not have a cybersecurity incident response plan consistently in force across the enterprise.
Report Finds That Industry 4.0 Will Pose New & Old Risks
Larry Loeb  
4/10/2019   Post a comment
Trend Micro thinks the fourth industrial revolution is upon us.
WordPress Vulnerable to SQL Injection
Larry Loeb  
4/9/2019   Post a comment
Security firm Securi has found out that on WordPress versions earlier than 3.4 it will allow an SQL injection vulnerability to occur.
FIN6 Expands Its Range With Ransomware
Larry Loeb  
4/8/2019   Post a comment
The well-known FIN6 group has been spotted trying its luck at a new game: ransomware.
Attackers Use 'Well-Known' Hidden HTTPS Directory to Spread Ransomware & Phishing Pages
Larry Loeb  
4/5/2019   1 comment
Researchers from security firm Zscaler's ThreatLabZ found themselves looking at WordPress and Joomla sites that were serving Shade/Troldesh ransomware (which has been known since 2014), backdoors, redirectors and a variety of phishing pages.
Increased Permissions in Mobile Apps Increases Potential Risk
Larry Loeb  
4/4/2019   18 comments
App user permissions should be justified, but many of them aren't.
Vulnerabilities Found in Kubernetes Container System
Larry Loeb  
4/3/2019   1 comment
Trouble with tarballs and more.
Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems
Steve Durbin  
4/2/2019   1 comment
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Cisco Router Still Vulnerable to Remote Attack After Attempted Fix
Larry Loeb  
4/2/2019   7 comments
The vendor finally admitted that the security patches it had released in January for the Small Business RV320 and RV325 routers don't work.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.
Android Banking Trojan 'Gustuff' Becomes More Dangerous
Larry Loeb  
3/29/2019   24 comments
New report puts Gustuff into the same threat tier as Anubis, Red Alert, Exobot, LokiBot and BankBot.
Artificial Intelligence in Modern Cybersecurity Operations
George Wrenn  
3/28/2019   8 comments
As a rapidly evolving field of science, AI has become flexible to new approaches and tools allowing even cutting-edge technology such as quantum computing under its umbrella of methods.
Worldwide Study Finds Limited Advances Against Evolving Threats
Larry Loeb  
3/28/2019   14 comments
Security vendor SonicWall has issued its SonicWall Cyber Threat Report based on its experiences in 2018.
Investigation Into LockerGoga Ransomware Finds Flaws in the Code
Larry Loeb  
3/27/2019   11 comments
Preliminary analysis of LockerGoga shows it has, in its current forms, limited ability to spread in a network.
WordPress Zero-Day Vulnerability Found in 'Social Warfare' Plugin
Larry Loeb  
3/26/2019   27 comments
'Social Warfare' was open to attacks through use of a stored Cross-Site Scripting (XSS) vulnerability that was introduced with the latest change made to the plugin (3.5.2).
5 Years of the NIST Cybersecurity Framework
Joe Stanganelli  
3/26/2019   1 comment
With NIST celebrating the five-year anniversary of its widely adopted and recommended Cybersecurity Framework just last month, a look back over the years illustrates how far the Framework has come.
Norsk Hydro: This Is How You React to a Ransomware Breach
Larry Loeb  
3/25/2019   10 comments
The company's response to a massive ransomware attack is an object lesson in how to do it right.
Facebook Exposes Millions of Unencrypted User Passwords
Larry Loeb  
3/22/2019   46 comments
It's an internal matter – but it could affect millions of the social network's users.
FIN7 Resurfaces With New Malware Techniques
Larry Loeb  
3/22/2019   5 comments
The FIN7 group of cyber criminals is still going strong.
Jackson County Still Recovering After Paying Ryuk Ransom
Joe Stanganelli  
3/21/2019   2 comments
Radio silence after reports of a headline-snagging ransomware payment in Jackson County, Ga., presents a possible case study in the pros and cons of paying ransomware attackers.
Evidence Found of Malware Families Collaborating
Larry Loeb  
3/20/2019   5 comments
IBM's X-Force has found that intertwined relationships exist between the Trickbot, Gozi, Ramnit and IcedID malware families – and that spells trouble.
Cyber Attacks Grow by 55% in 2018 & Data Theft Dominates – Report
Larry Loeb  
3/19/2019   11 comments
The findings from Positive Technologies aren't that, erm, positive.
Is Your Supply Chain the Weakest Link?
Steve Durbin  
3/19/2019   2 comments
Despite organizations' best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain.
Study Shows Massive Attacks Bypassing MFA
Larry Loeb  
3/18/2019   9 comments
Multi-factor authentication is no silver bullet for security problems.
New IoT Device Regulation Establishes Base Line for Security
Larry Loeb  
3/15/2019   3 comments
Legislation seeks to use the spending power of the government, which, if the bill goes through, will only be able to acquire those IoT devices that meet the bill's requirements.
North Korea Circumvents Sanctions Through Cybercrime, Says Report
Larry Loeb  
3/14/2019   1 comment
The UN report believes the DPRK has snaffled up half a billion dollars so far through nefarious means.
Convergence: Real Problems When it Comes to Securing the IoT/IIoT
Alan Zeichick  
3/14/2019   Post a comment
Today, enterprises are dealing with a proliferation of connected devices that probably aren't dedicated to computing – think video cameras, inventory sensors, machine tools, thermostats and environmental monitors.
Enterprise Is the Target of 'Big Game Hunting'
Larry Loeb  
3/11/2019   Post a comment
GrandCrab has mutated, and enterprises should be worried.
Study Finds 77% of Mobile Users Compromised by Leak of PII Data
Larry Loeb  
3/8/2019   Post a comment
It doesn't help that 43% of companies have at least one mobile device with no lock screen active.
InfoSec Community Excited as NSA Releases Ghidra 9.0 to the Public
Larry Loeb  
3/7/2019   Post a comment
At the RSA Conference in San Francisco this week, the National Security Agency released to the public one of its internal tools, Ghidra 9.0, which is used for software reverse engineering. The NSA has been using it internally for a decade.
Qbot Mutation Poses Global Threat
Larry Loeb  
3/5/2019   Post a comment
Once again, we can see how malware change will defeat static signature analysis.
Boosted Rowhammer & Cache Attacks Spell Bad News for Intel
Larry Loeb  
3/5/2019   Post a comment
Researchers from Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany have published a paper that is really bad news for Intel.
Akamai's Stats Reveal Retail's Vulnerability
Larry Loeb  
3/4/2019   1 comment
A single AIO bot can target more than 120 retailers at once.
Digital Signatures Can Be Forged in PDF Docs
Larry Loeb  
3/1/2019   18 comments
Researchers in Germany have figured out three different ways to forge digital signatures in PDF documents.
Endpoint-Security Companies in High Demand for Buyouts, Partnerships
Joe Stanganelli  
2/28/2019   17 comments
Since last year, endpoint-protection firms have been among the biggest movers and shakers in the cybersecurity realm – with the endpoint-security market seeing more than a typical share of acquisitions and strategic partnerships. Joe Stanganelli takes a look at why this might be happening.
Attack Code 'MarioNet' Is Pulling Strings in Your Web Browser
Larry Loeb  
2/28/2019   24 comments
JavaScript APIs have stretched the boundaries of what is run in the browser to enable feature-rich web applications. But this comes at a price...
Digital Transformation With IoT: Assessing Risk Through Standards & Visibility
Joe Stanganelli  
2/27/2019   19 comments
IoT transformation is a gift and a curse that carries both business agility and business risk. As the world digitally transforms into something "smarter" than itself, IoT devices proliferate, demanding a lot of resources to keep up with them all – and, by extension, secure them all.
Weak Human Link Still Main Enterprise Security Concern
Larry Loeb  
2/27/2019   17 comments
KnowBe4 study confirms what we pretty much knew already.
Page 1 / 2   >   >>




Latest Articles
A security patch has been made for jQuery to mitigate 'prototype pollution.'
The Internet is going to run out of address space sometime this month.
Confiant has spotted the known threat actor eGobbler back in action.
Israeli-based Cyberint has found evidence of remote access Trojans being used in attacks on financial entities in the United States as well as worldwide.
Sources say that the company was being used as the start of 'digital fishing expeditions targeting at least a dozen Wipro customer systems.'
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with