Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content
<<   <   Page 2 / 2
Is There a Silver Bullet for Zero-Day Attacks?
Larry Loeb  
2/25/2019   13 comments
Silicon Valley startup K2 Cyber Security says it has a product that will stop any zero-day attack. So where's the proof?
Here it Comes – Internet Privacy Regulation
Larry Loeb  
2/22/2019   13 comments
A new report by the US Government Accountability Office could be the catalyst for meaningful change on the Internet privacy front.
Supply Chain Attacks Increase 78%
Larry Loeb  
2/21/2019   5 comments
The kinds of threats an organization encounters are changing as the defenses that are brought to bear upon them change.
Russia – Fastest State Threat in the World
Larry Loeb  
2/20/2019   3 comments
Russian threat actors were the most prolific last years – and were eight times faster at 'breaking out' than their nearest rival.
Digital Transformation With Cloud: Answering Risks With Algorithms
Joe Stanganelli  
2/20/2019   8 comments
Cloud projects are big. Huge. So it's not perpetuating FUD to point out that cloud transformation still bears security and data-stewardship risks. But what appears too big a challenge for mere man might be no match for machine.
Take White Hats Seriously to Staunch the Flow of Zero-Days
Joe Stanganelli  
2/19/2019   10 comments
Zero-day vulnerabilities are serious, and on the rise. And IT-security teams make the problem worse when they fail to respond, or respond poorly, to responsible vulnerability disclosures.
Container Vulnerability: Still a Reality
Larry Loeb  
2/18/2019   4 comments
A security problem with runC that could allow attackers to escape Linux containers and obtain unauthorized, root- level access to the host operating system is on the move.
Increased Cryptomining: a Toehold for Attackers
Larry Loeb  
2/15/2019   7 comments
New research reveals that in the last nine months of 2018 there has been a 19x increase in cryptomining activity on the Internet.
Lessons Learned From 2018 Security Breaches
Marzena Fuller  
2/14/2019   61 comments
It's better to hear about a data breach internally than by a security researcher who happens to discover a publicly exposed asset or confidential data for sale on a dark web.
The Rise of 'Fileless' Malware
Larry Loeb  
2/14/2019   7 comments
The attack that fileless malware causes does not touch the disk of the target, loading the malware instructions only into memory. Sneaky.
Google Moves to Control More of the Internet
Larry Loeb  
2/13/2019   5 comments
The company has said that its goal is only to create a faster Internet, which allows for more use and hence more searches and thus more revenue for them.
What You Need to Know About Arbitrary Code Execution Vulnerabilities
Alan Zeichick  
2/12/2019   1 comment
Despite their rather innocuous name, ACE vulnerabilities can appear in just about any software. So here's what to do...
Six Large Data Dumps Add Fuel to Collection #1's Fire
Joe Stanganelli  
2/12/2019   Post a comment
Collection #1 was just the beginning. Researchers at Recorded Future have uncovered six more dark-web data dumps to complete the set — and possibly hint at even more password databases circulating.
AI & 'Fuzzing' Combination Empowers APT
Larry Loeb  
2/11/2019   2 comments
When the bad guys add AI and 'fuzzing' to their armory, the advanced persistent threat gets, erm, even more threatening.
How Secure Is Manufacturing?
Larry Loeb  
2/8/2019   4 comments
Study finds that manufacturing industries struggle to find skilled cybersecurity staff and are underspending on training – but it's not all bad news...
Google's GDPR Fine: What It Means for Jurisdictional Arbitrage
Joe Stanganelli  
2/7/2019   1 comment
In the wake of France's recent €50 million GDPR fine against Google, enterprises should consider GDPR-enforcement considerations when determining the base of their EU operations.
Email Fraud – New Trends Exposed
Larry Loeb  
2/7/2019   3 comments
It's the security threat that just keeps on giving.
Modern Enterprise – Stewards of Personal Data
Larry Loeb  
2/6/2019   3 comments
Get on the nine-step program if you want to assure data privacy.
A Collaborative Approach to Cybersecurity: Beyond ISACs
Cody Cornell  
2/5/2019   1 comment
When it comes to fighting cyber threats, automation and collaboration could help SOCs do more with less.
Beware of 'TheMoon' – Evolving Botnets
Larry Loeb  
2/4/2019   16 comments
CenturyLink's labs have been tracking a shape-shifting IoT botnet that is a security professional's worst nightmare.
UAE's Cyberwar on Civilians Employed Former US Intelligence Operatives
Joe Stanganelli  
2/1/2019   4 comments
A recent exposé about a surveillance program in the United Arab Emirates raises uncomfortable questions about cyberwarfare and US intelligence officers.
Is Your Cisco Router Leaving Your Enterprise Vulnerable?
Larry Loeb  
1/31/2019   8 comments
If your network uses Cisco's RV320 or RV325 Dual Gigabit WAN VPN routers, you are already under attack.
Four Security Questions You Need to Answer for SD-WAN Success
Alan Zeichick  
1/31/2019   7 comments
Before you select an SD-WAN vendor, read this.
Should All IAM Be CIAM?
Joe Stanganelli  
1/30/2019   6 comments
CIAM vendors are right that traditional IAM isn't going to cut it for customer-facing solutions – but their sound premises have led to the perverse conclusion of keeping in-house IAM systems suboptimal. What if the power of CIAM could help employees realize better usability and security too?
Japanese Government to Use 'Credential Stuffing' to Survey Consumer IoT Devices
Larry Loeb  
1/30/2019   18 comments
The Japanese government is concerned about the security of IoT devices – but is a mass attempt to log into consumers' devices the right approach to the issue?
5G Security Transformation: Why Businesses Need to Prepare Now
News Analysis  
1/29/2019   7 comments
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
'Steganography' Obsfucation Hides Old PDF Exploits From Antivirus Tools
Larry Loeb  
1/28/2019   20 comments
EdgeSpot has found two new obsfucation methods to hide old PDF exploits from various antivirus tools.
Four Enterprise Identity & Access Management Trends to Watch in 2019
Alan Zeichick  
1/25/2019   25 comments
For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.
DNS Tampering Prompts Homeland Security Warning
Larry Loeb  
1/24/2019   10 comments
Despite the partial federal government shutdown, DHS has managed to issue a warning to the public about possible tampering with DNS addresses that appear to have originated in Iran.
In the Cloud, SD-WAN Provides Security at the Edge
News Analysis  
1/23/2019   7 comments
As businesses move to the cloud, remote locations are relying more and more on SD-WAN. However, this change means a different approach to security. Here's why enterprises should look to the edge.
Enterprises Are Getting Smarter When It Comes to Patching Vulnerabilities – Study
Larry Loeb  
1/22/2019   11 comments
A joint analysis from Kenna Security and the Cyentia Institute finds that enterprises are getting better at patching vulnerabilities, specifically by focusing on critical flaws as opposed to trying to fix very problem that is published.
Microsoft Looks to Squash Bugs in its Azure DevOps Product
Larry Loeb  
1/21/2019   18 comments
Microsoft's latest bug-hunting program is targeting the company's Azure DevOps platform, which looks to make software development more secure.
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  
1/18/2019   3 comments
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
Exposed Oklahoma Server Shows On-Premises Data Is Vulnerable, Too
News Analysis  
1/18/2019   16 comments
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
Intel Patching SGX Flaw That Can Lead to Escalation of Privileges
Larry Loeb  
1/18/2019   4 comments
A security researcher has found another flaw in Intel's SGX software than can allow an attacker to escalate administrative privileges within an infected machine.
'Collection #1' Repository Totals 87GB of Stolen Email Addresses & Passwords
News Analysis  
1/17/2019   1 comment
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
A Diverse Security Workforce Is a Stable Security Workforce
News Analysis  
1/17/2019   2 comments
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Fancy Bear's LoJax C&C Servers Still Functioning in the Wild
News Analysis  
1/17/2019   Post a comment
A new report from NetScout's ASERT Team found that two command-and-control servers associated with Fancy Bear's LoJax malware are still active.
Cyber Attacks, Climate Change Are Top Global Risk for Businesses & Governments
News Analysis  
1/17/2019   Post a comment
The World Economic Forum ranks climate change, economic instability, cyber attacks and data thefts as some of the top concerns facing businesses around the globe.
Justice Department Indicts 2 Ukrainian Nationals With Hacking SEC
News Analysis  
1/16/2019   1 comment
The Justice Department has charged two Ukrainian nationals with hacking into the SEC's EDGAR systems and accessing sensitive company reports and other data before the information was made public.
Federal Judge: Police Can't Force Suspects to Unlock Devices Using Biometrics
Larry Loeb  
1/16/2019   1 comment
A federal judge in California finds that police can't force suspects to unlock their smartphones or other mobiles using biometrics. The court found biometrics are protected much the same way passwords are.
Zix Acquiring AppRiver to Bolster Email Security for SMBs
News Analysis  
1/16/2019   Post a comment
In a move to bolster its email security portfolio for small and midsized businesses, Dallas-based Zix is paying $275 million for AppRiver.
Schneider Electric EV Charging Stations Vulnerable to Attack
News Analysis  
1/15/2019   1 comment
Researchers at Positive Technologies have found three vulnerabilities within Schneider Electric's EVlink Parking electric vehicle charging stations, which could allow an attacker to take control of the system.
Average Cyber Attack Cleanup Tops $1M, Radware Finds
News Analysis  
1/15/2019   1 comment
Over the last year, the amount that companies pay out to clean up from a cyber attack jumped more than 50%, topping $1 million on average, according to a new industry survey from Radware.
Texas City Hit With Ransomware
News Analysis  
1/15/2019   Post a comment
It's back to paper and pen for a while for Del Rio, Texas, which was hit with a ransomware attack earlier this month.
Ryuk Ransomware Origin Remains a Mystery
News Analysis  
1/14/2019   Post a comment
After shutting down newspaper printing facilities, as well as a cloud hosting firm, security researchers are debating who is behind the Ryuk ransomware. While it seemed that North Korea played a role, more research shows that a Russian gang might be responsible.
US Government Shutdown Preventing SSL Certificates From Being Renewed
Larry Loeb  
1/14/2019   Post a comment
The shutdown of the federal government is not only affecting federal workers, but the websites that various departments run. Specifically, SSL certificates are not being renewed.
Iran Suspected of 'Stealthy & Sophisticated' DNS Hijacking Campaign
Larry Loeb  
1/11/2019   Post a comment
New research from FireEye suggests that a group working within Iran is behind a large-scale DNS hijacking scheme that involves web traffic all across the globe.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  
1/11/2019   Post a comment
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Hyatt Hotels Kicks Off Bug Bounty Program
News Analysis  
1/11/2019   1 comment
Hyatt Hotels is teaming with HackerOne on a new bug bounty hunting program that looks to pay up to $4,000 for ‘critical’ vulnerabilities in software.
<<   <   Page 2 / 2




Latest Articles
The Internet is going to run out of address space sometime this month.
Confiant has spotted the known threat actor eGobbler back in action.
Israeli-based Cyberint has found evidence of remote access Trojans being used in attacks on financial entities in the United States as well as worldwide.
Sources say that the company was being used as the start of 'digital fishing expeditions targeting at least a dozen Wipro customer systems.'
Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with