Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Most Commented Content posted in December 2019
Snatch Is Both Novel & Evil
Larry Loeb  
12/11/2019   4 comments
The Sophos Managed Threat Response team found out that, where the Snatch ransomware is concerned, things just more ugly.
Azure OAuth 2.0 Vulnerability Grabs Tokens
Larry Loeb  
12/5/2019   3 comments
Security firm CyberArk is now finally able to discuss a major OAuth 2.0 vulnerability that affects Microsoft Azure web services.
Spear Phishing: Don't Rise to the Bait, Says Microsoft
Larry Loeb  
12/4/2019   2 comments
Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media.
Hardware Is the New Attack Surface – Forrester
Larry Loeb  
12/12/2019   2 comments
Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting.
With Plundervolt, an Intel Processor's Secure Enclave Is No Longer Secure
Larry Loeb  
12/16/2019   2 comments
Major hardware vulnerability can allow the changing of information that is supposedly stored as secure in the chip’s Secure Enclave.
CISA Alerts the Financial Sector About Dridex
Larry Loeb  
12/9/2019   2 comments
One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.
FBI's Portland Office Spies IoT Education Opportunity
Larry Loeb  
12/10/2019   2 comments
The Federal Bureau of Investigation's office in Portland, Ore., uses 'Tech Tuesday' to offer IoT security advice.
5G Security Rests on an Unstable Base
Larry Loeb  
12/23/2019   2 comments
Positive Technologies has issued a report on the emerging security problems of 5G signaling networks.
Europe Starts to Build Its Own Secure Cloud
Oliver Schonschek  
12/5/2019   2 comments
The German Federal Government wants to join forces with other European partners to create a secure cloud for Europe called GAIA-X.
Crystal Ball: The Top 3 Global Cybersecurity Threats for 2020
Steve Durbin  
12/23/2019   2 comments
In the year ahead, organizations of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected, high-impact cybersecurity events.
New Botnet Uses DHT as Its Foundation
Larry Loeb  
12/24/2019   1 comment
Security researchers at 360 Netlab have been watching a new botnet they call Mozi for the last four months. It's a new P2P botnet with implementation that is based on the Distributed Hash Table protocol.
Mac Malware Breaks Into Top 5 Threats of 2019 – Malwarebytes Labs
Larry Loeb  
12/30/2019   1 comment
Of the top 25 detections across all platforms, six were Mac threats, the researchers discovered.
TrickBot Drops an Anchor
Larry Loeb  
12/17/2019   1 comment
New threat has been used in campaigns against financial, manufacturing, and retail businesses across the US and Europe.
RST Gets Fixed
Larry Loeb  
12/18/2019   1 comment
Peleg Hadar of SaveBreach Labs has posted about the vulnerability he found in Intel's Rapid Storage Technology Service.
Happier Holidays as Ad Threat Declines
Larry Loeb  
12/20/2019   1 comment
DEVCON report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication.
ATP Rises to the Polymorphic Malware Challenge
Larry Loeb  
12/3/2019   1 comment
The Microsoft Defender ATP Research Team has begun to discuss a polymorphic threat, Dexphot, that it has been tracking for over a year.
Zero-Day Vulnerabilities Discovered in Enterprise-Grade VPN
Larry Loeb  
12/6/2019   1 comment
Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour.




Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with