Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content
Page 1 / 2   >   >>
Microsoft Looks to Squash Bugs in its Azure DevOps Product
Larry Loeb  
1/21/2019   5 comments
Microsoft's latest bug-hunting program is targeting the company's Azure DevOps platform, which looks to make software development more secure.
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  
1/18/2019   Post a comment
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
Exposed Oklahoma Server Shows On-Premises Data Is Vulnerable, Too
News Analysis  
1/18/2019   1 comment
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
Intel Patching SGX Flaw That Can Lead to Escalation of Privileges
Larry Loeb  
1/18/2019   3 comments
A security researcher has found another flaw in Intel's SGX software than can allow an attacker to escalate administrative privileges within an infected machine.
'Collection #1' Repository Totals 87GB of Stolen Email Addresses & Passwords
News Analysis  
1/17/2019   Post a comment
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
A Diverse Security Workforce Is a Stable Security Workforce
News Analysis  
1/17/2019   Post a comment
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Fancy Bear's LoJax C&C Servers Still Functioning in the Wild
News Analysis  
1/17/2019   Post a comment
A new report from NetScout's ASERT Team found that two command-and-control servers associated with Fancy Bear's LoJax malware are still active.
Cyber Attacks, Climate Change Are Top Global Risk for Businesses & Governments
News Analysis  
1/17/2019   Post a comment
The World Economic Forum ranks climate change, economic instability, cyber attacks and data thefts as some of the top concerns facing businesses around the globe.
Justice Department Indicts 2 Ukrainian Nationals With Hacking SEC
News Analysis  
1/16/2019   Post a comment
The Justice Department has charged two Ukrainian nationals with hacking into the SEC's EDGAR systems and accessing sensitive company reports and other data before the information was made public.
Federal Judge: Police Can't Force Suspects to Unlock Devices Using Biometrics
Larry Loeb  
1/16/2019   1 comment
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
Zix Acquiring AppRiver to Bolster Email Security for SMBs
News Analysis  
1/16/2019   Post a comment
In a move to bolster its email security portfolio for small and midsized businesses, Dallas-based Zix is paying $275 million for AppRiver.
Schneider Electric EV Charging Stations Vulnerable to Attack
News Analysis  
1/15/2019   1 comment
Researchers at Positive Technologies have found three vulnerabilities within Schneider Electric's EVlink Parking electric vehicle charging stations, which could allow an attacker to take control of the system.
Average Cyber Attack Cleanup Tops $1M, Radware Finds
News Analysis  
1/15/2019   Post a comment
Over the last year, the amount that companies pay out to clean up from a cyber attack jumped more than 50%, topping $1 million on average, according to a new industry survey from Radware.
Texas City Hit With Ransomware
News Analysis  
1/15/2019   Post a comment
It's back to paper and pen for a while for Del Rio, Texas, which was hit with a ransomware attack earlier this month.
Ryuk Ransomware Origin Remains a Mystery
News Analysis  
1/14/2019   Post a comment
After shutting down newspaper printing facilities, as well as a cloud hosting firm, security researchers are debating who is behind the Ryuk ransomware. While it seemed that North Korea played a role, more research shows that a Russian gang might be responsible.
US Government Shutdown Preventing SSL Certificates From Being Renewed
Larry Loeb  
1/14/2019   Post a comment
The shutdown of the federal government is not only affecting federal workers, but the websites that various departments run. Specifically, SSL certificates are not being renewed.
Iran Suspected of 'Stealthy & Sophisticated' DNS Hijacking Campaign
Larry Loeb  
1/11/2019   Post a comment
New research from FireEye suggests that a group working within Iran is behind a large-scale DNS hijacking scheme that involves web traffic all across the globe.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  
1/11/2019   Post a comment
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Hyatt Hotels Kicks Off Bug Bounty Program
News Analysis  
1/11/2019   1 comment
Hyatt Hotels is teaming with HackerOne on a new bug bounty hunting program that looks to pay up to $4,000 for ‘critical’ vulnerabilities in software.
Zerodium Ups Ante for Zero-Day Exploits, Especially in iOS
News Analysis  
1/10/2019   Post a comment
Zerodium, which buys flaws and exploits for its customers, is upping the amount it pays for several different types of vulnerabilities, especially Apple's iOS.
Wi-Fi 6 Bakes in Additional IoT Security
Larry Loeb  
1/10/2019   8 comments
At CES this week, the Wi-Fi Alliance offered new details on the new Wi-Fi 6 protocol, which bakes in some additional safeguards for IoT security.
Sophos & Akamai Target Cloud Security With Acquisitions
News Analysis  
1/9/2019   Post a comment
As companies move more data to the cloud, data security becomes a major issue. To address these concerns, Sophos is acquiring Avid Security and Akamai inked a deal for Janrain.
Windows, Linux Susceptible to New Side-Channel Vulnerability
Larry Loeb  
1/9/2019   Post a comment
In a new paper co-authored by a researcher who discovered Spectre, it appears that Windows and Linux are susceptible to a new type of side-channel vulnerability that can target the page cache of an operating system.
Radware Boosts Bot-Fighting Capabilities With ShieldSquare Acquisition
News Analysis  
1/8/2019   Post a comment
Radware plans to bolster its cloud security portfolio with a deal for ShieldSquare, which offers tools for fighting bots.
Spectre, Meltdown Vulnerabilities Will Haunt Industry for Years
Jeffrey Burt  
1/8/2019   2 comments
Chip makers such as Intel have released patches and fixes to mitigate Spectre and Meltdown issues, but the problem won't be solved until they come out with new architectures, which is two to three years away.
New Malvertising Campaign Delivers Vidar Stealer Plus Ransomware
News Analysis  
1/8/2019   Post a comment
Malwarebytes Labs has uncovered a new malvertising campaign in the wild that delivers a one-two punch: the Vidar data stealer and GrandCrab ransomware.
Academics Look to Bolster the Optimization of Neural Networks
Larry Loeb  
1/7/2019   2 comments
A trio of academic papers looks at the current methods used to train neural networks and where the techniques can be improved in order to benefit the businesses that use them.
US Air Force: 5G Dominance Critical to National Security
Joe Stanganelli  
1/7/2019   1 comment
In a November 2018 report, the US Air Force's Electromagnetic Defense Task Force ranks control of 5G networks and spectrum as a top priority for national security in the event of a substantial electromagnetic disturbance.
Marriott Revises Data Breach Numbers as Investigation Continues
News Analysis  
1/4/2019   3 comments
Marriott has revised the number of customer accounts it believes were affected during a massive data breach. While the overall number dropped, the company now believes 5 million unencrypted passport numbers were exposed.
Six CISO Trends to Watch in 2019
News Analysis  
1/4/2019   1 comment
From legislation to insurance to staffing, 2019 is shaping up as a challenging year for CISOs. Here are six top trends security executives need to watch.
New USB Type-C Standards Offer Cryptographic-Based Security
Larry Loeb  
1/4/2019   19 comments
The USB-IF has published new guidelines that looks to bring tougher security protocols, including cryptography, to USB Type-C devices to better protect against attacks.
Ryuk Ransomware Tied to Printing Press & Cloud Service Provider Attacks
News Analysis  
1/3/2019   7 comments
A series of cyber attacks over the holiday week that targeted newspaper printing presses and a cloud service provider are tied to a specific strain of ransomware called Ryuk.
EU's FOSSA Project Launches New Bug Bounty Program
Larry Loeb  
1/3/2019   4 comments
The European Union's FOSSA project is launching its first-ever bug bounty program that will focus on 15 different software platforms starting later in January.
Phishing & Social Engineering Attacks Will Rise in 2019
News Analysis  
1/2/2019   5 comments
The rise of fileless attack techniques and other developments is making phishing a much more serious problem for enterprise security. As we head into 2019, a new approach is needed.
Ten Cybersecurity Predictions That I Don't Like for 2019
Alan Zeichick  
1/1/2019   10 comments
If 2018 turned into a security headache for enterprises, our writers predicts that 2019 won't be much better – maybe even worse.
4 Global Cybersecurity Threats for 2019
News Analysis  
12/31/2018   4 comments
As the calendar turns to 2018, ISF is urging members to watch out for four specific security issues: ransomware, legislation, IoT and supply chain.
5G Network Security Needs a Comprehensive Approach in 2019
News Analysis  
12/28/2018   15 comments
As the first 5G rollouts are anticipated to start in 2019, service providers need to take a more holistic and comprehensive approach to securing these new networks and the businesses and customers using them.
Healthcare Industry Still in Ransomware Crosshairs
Jeffrey Burt  
12/27/2018   16 comments
A report by Kaspersky researchers has found that healthcare organizations in the US and Canada are still at heightened risk of ransomware attacks.
Security Leaders Need to Heed the Harsh Security Lessons of 2018
News Analysis  
12/26/2018   4 comments
The sheer number of incidents from 2018 has put even more of the spotlight on enterprise security. Over the next 12 months, businesses need be on the lookout for email and stolen privileges schemes, nation-state attacks and increases in compliance legislation.
SOP Story: Why Protecting Web Browsers Remains a Security Cornerstone
Larry Loeb  
12/24/2018   22 comments
One of the oldest ways to protect content on the web is SOP. However, it's not always implemented in the same way on all browsers. This can complicate one of the main cornerstones of Internet security.
Huawei Routers Vulnerable to Simplified Credential Stuffing Attack
Larry Loeb  
12/21/2018   14 comments
Security researchers at NewSky have found a vulnerability in Huawei's HG routers that leave these devices open to a brute force attack. The company has been notified, but it's not clear what, if any fix, has been applied.
Justice Department Ties 2 Chinese Nationals to Notorious APT10 Group
News Analysis  
12/21/2018   6 comments
In another indictment aimed at China's cyberespionage infrastructure, the Justice Department has charged two Chinese nationals with belonging to the notorious APT10 group, which targeted industries in the US, Japan and other countries.
Cloud Backup: How It Can Protect Against Ransomware
Jeffrey Burt  
12/20/2018   1 comment
For enterprises anxious to avoid being extorted by attackers using ransomware, backing up data to the cloud is an option to consider, though it's not the answer for everyone.
Email Spam: Don't Be a Chump or a Jerk
Alan Zeichick  
12/20/2018   2 comments
For decades, spam emails have clogged up corporate email inboxes. However, there are some simple rules and guidelines IT pros, as well as marketers, can use to cut down on this, and make everyone more secure.
McAfee: IoT & Crypomining Malware Growth Exploded in Q3
News Analysis  
12/20/2018   6 comments
In its new quarterly threat report, McAfee Labs researchers found that malware targeting IoT devices, as well as cryptomining, continued to grow, specifically by taking advantage of lax security practices.
Jenkins Flaw Can Allow Attackers to Log In as Admins
Larry Loeb  
12/19/2018   4 comments
New research from CyberArk finds a critical flaw in Jenkins servers that can allow an attacker to log in as an administrator, which can lead to any number of compromises and malicious activity.
Many Enterprises Still Blind to Security Risk, Study Finds
Jeffrey Burt  
12/19/2018   1 comment
Even as organizations continue to get hit with cyber attacks, they're struggling to accurately measure the costs of such events to their operations, a report by Tenable and the Ponemon Institute found.
US Ballistic Missile Defense System Riddled With Security Flaws
News Analysis  
12/18/2018   1 comment
An Inspector General's report concerning the Defense Department's Ballistic Missile Defense System found numerous security flaws, including a lack of multi-factor authentication and classified information stored on removable drives.
Shamoon Malware Re-Emerges With Attacks in Italy, Middle East
News Analysis  
12/18/2018   Post a comment
Over the last week, several reports emerged that the Shamoon malware, which was last seen in 2016, has re-emerged with attacks in Italy and the Middle East. This version includes a destructive data file wiper.
Russian-Backed Sofacy Group Used New Cannon Trojan in Recent Attacks
Larry Loeb  
12/17/2018   Post a comment
Palo Alto Networks' Unit 42 has documented two months of attacks from the Sofacy group, which also goes by Fancy Bear and APT28. Researchers found the attackers deployed a new Trojan called Cannon.
Page 1 / 2   >   >>




Latest Articles
Microsoft's latest bug-hunting program is targeting the company's Azure DevOps platform, which looks to make software development more secure.
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
A security researcher has found another flaw in Intel's SGX software than can allow an attacker to escalate administrative privileges within an infected machine.
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
The shutdown of the federal government is not only affecting federal workers, but the websites that various departments run. Specifically, SSL certificates are not being renewed.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with