Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Content posted in April 2019
Shadow IT & Unsecured Data Still Rampant Within the Digital Workplace
Larry Loeb  
4/30/2019   10 comments
The digital workplace is full of opportunities for improvement.
NIST Offers Improved Software Testing
Larry Loeb  
4/29/2019   11 comments
Combinatorial testing is a software testing method that the National Institute of Science and Technology (NIST) likes a lot.
Enterprise Attacks Increase 235%: Trojans & Ransomware Most Common
Larry Loeb  
4/26/2019   19 comments
The Malwarebytes Labs Cybercrime Tactics and Techniques Q1 2019 report found in just one year, threats aimed at corporate targets have increased by 235%. Trojans, such as Emotet, and ransomware were the most likely attacks.
EU Approves Addition of Biometrics to Tracking Database
Larry Loeb  
4/25/2019   4 comments
The Common Identity Repository (CIR) will unify a disparate set of records that exist for more than 350 million people.
New Fix for jQuery Vulnerabilities
Larry Loeb  
4/24/2019   5 comments
A security patch has been made for jQuery to mitigate 'prototype pollution.'
Networks in Danger as Global BGP Routing Table Reaches Capacity
Larry Loeb  
4/23/2019   4 comments
The Internet is going to run out of address space sometime this month.
Over 500 Million Chrome iOS Sessions Hijacked in Massive Malvertising Campaign
Larry Loeb  
4/22/2019   18 comments
Confiant has spotted the known threat actor eGobbler back in action.
Russian Hacker Group TA505 Found to Be Attacker of US Financial Firms
Larry Loeb  
4/19/2019   4 comments
Israeli-based Cyberint has found evidence of remote access Trojans being used in attacks on financial entities in the United States as well as worldwide.
Wipro Gets Phished to Gain Access to Clients
Larry Loeb  
4/18/2019   2 comments
Sources say that the company was being used as the start of 'digital fishing expeditions targeting at least a dozen Wipro customer systems.'
Servers Discovered With Multiple Malware Families, Staged & Ready to Launch
Larry Loeb  
4/17/2019   1 comment
Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.
Warning: VPN Application Vulnerabilities Found
Larry Loeb  
4/16/2019   6 comments
That enterprise-grade virtual private network might not be as private as you think.
Who Built the 'Taj Mahal'?
Larry Loeb  
4/15/2019   3 comments
While the sophistication of the malware suggests that it is the product of a nation-state, it bears none of the code fingerprints of any known nation-state hacker group.
IoE: The Internet of Espionage
Joe Stanganelli  
4/12/2019   1 comment
As employees live their lives across an increasingly IoT-enabled landscape (with devices often installed discreetly and with hidden functionalities), enterprise security is threatened by outside factors it cannot control.
New Vulnerabilities Found in WP3 WiFi Standard
Larry Loeb  
4/12/2019   2 comments
Two researchers have made mincemeat of the new WPA3 certification.
Majority of Enterprise Firms Lack Active Incident Response Plans
Larry Loeb  
4/11/2019   1 comment
Report found that 77% of respondents indicated they do not have a cybersecurity incident response plan consistently in force across the enterprise.
Report Finds That Industry 4.0 Will Pose New & Old Risks
Larry Loeb  
4/10/2019   Post a comment
Trend Micro thinks the fourth industrial revolution is upon us.
WordPress Vulnerable to SQL Injection
Larry Loeb  
4/9/2019   Post a comment
Security firm Securi has found out that on WordPress versions earlier than 3.4 it will allow an SQL injection vulnerability to occur.
FIN6 Expands Its Range With Ransomware
Larry Loeb  
4/8/2019   Post a comment
The well-known FIN6 group has been spotted trying its luck at a new game: ransomware.
Attackers Use 'Well-Known' Hidden HTTPS Directory to Spread Ransomware & Phishing Pages
Larry Loeb  
4/5/2019   1 comment
Researchers from security firm Zscaler's ThreatLabZ found themselves looking at WordPress and Joomla sites that were serving Shade/Troldesh ransomware (which has been known since 2014), backdoors, redirectors and a variety of phishing pages.
Increased Permissions in Mobile Apps Increases Potential Risk
Larry Loeb  
4/4/2019   27 comments
App user permissions should be justified, but many of them aren't.
Vulnerabilities Found in Kubernetes Container System
Larry Loeb  
4/3/2019   2 comments
Trouble with tarballs and more.
Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems
Steve Durbin  
4/2/2019   1 comment
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Cisco Router Still Vulnerable to Remote Attack After Attempted Fix
Larry Loeb  
4/2/2019   7 comments
The vendor finally admitted that the security patches it had released in January for the Small Business RV320 and RV325 routers don't work.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.




Latest Articles
But to prepare for something usually means you have an idea about what you are preparing for, no?
An emerging and increasingly sophisticated threat campaign is employing obscure file formats.
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
An IoT device carries with it the implicit threat of being used for nefarious purposes if it has not been created with security foremost in mind.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with