Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content
<<   <   Page 2 / 2
Serverless Computing: A New World of Security Risks
Joe Vadakkan  
5/8/2019   1 comment
Serverless computing, or function-as-a-service (FaaS), is a new cloud paradigm gaining significant momentum in the developer world.
Enterprise Resilience: It's the Ecosystem, Stupid
Larry Loeb  
5/7/2019   2 comments
Organizations must rethink their approach to security in a way that defends not just themselves, but the entire ecosystem they inhabit, says Accenture report.
Security Workforce 2019: Closing the Gap Builds a Bridge to the Future
Steve Durbin  
5/7/2019   1 comment
To plug the ongoing cybersecurity skills gap, those doing the hiring need to start thinking outside the box.
Quabot Trojan Evolves to Become Harder to Detect & Remove
Larry Loeb  
5/6/2019   4 comments
Researchers at Cisco Talos were the first to find that Quabot Trojan has been updated and changed.
Cybercrime Study Finds Increasing Costs as Well as Changing Targets & Methods
Larry Loeb  
5/3/2019   10 comments
Accenture and Ponemon Institute say that they are analyzing the latest cost numbers of cybercrime to try and help leaders to better target security investments and resources.
MuddyWater: The Dissection of an APT
Larry Loeb  
5/2/2019   7 comments
Kaspersky Security has taken a deep dive into MuddyWater.
Bootstrapping Security Programs: How to Gradually Implement an Enterprise-Level Security Program at a Fast-Growing Startup
Marzena Fuller  
5/2/2019   3 comments
You can't expect to build an adequate security program without investment in both people and security tools.
190,000 Accounts in Docker Hub Database May Have Been Exposed
Larry Loeb  
5/1/2019   7 comments
Potentially poisoned images could be distributed without the distributors realizing that this is occurring.
Shadow IT & Unsecured Data Still Rampant Within the Digital Workplace
Larry Loeb  
4/30/2019   10 comments
The digital workplace is full of opportunities for improvement.
NIST Offers Improved Software Testing
Larry Loeb  
4/29/2019   11 comments
Combinatorial testing is a software testing method that the National Institute of Science and Technology (NIST) likes a lot.
Enterprise Attacks Increase 235%: Trojans & Ransomware Most Common
Larry Loeb  
4/26/2019   19 comments
The Malwarebytes Labs Cybercrime Tactics and Techniques Q1 2019 report found in just one year, threats aimed at corporate targets have increased by 235%. Trojans, such as Emotet, and ransomware were the most likely attacks.
EU Approves Addition of Biometrics to Tracking Database
Larry Loeb  
4/25/2019   4 comments
The Common Identity Repository (CIR) will unify a disparate set of records that exist for more than 350 million people.
New Fix for jQuery Vulnerabilities
Larry Loeb  
4/24/2019   5 comments
A security patch has been made for jQuery to mitigate 'prototype pollution.'
Networks in Danger as Global BGP Routing Table Reaches Capacity
Larry Loeb  
4/23/2019   4 comments
The Internet is going to run out of address space sometime this month.
Over 500 Million Chrome iOS Sessions Hijacked in Massive Malvertising Campaign
Larry Loeb  
4/22/2019   18 comments
Confiant has spotted the known threat actor eGobbler back in action.
Russian Hacker Group TA505 Found to Be Attacker of US Financial Firms
Larry Loeb  
4/19/2019   4 comments
Israeli-based Cyberint has found evidence of remote access Trojans being used in attacks on financial entities in the United States as well as worldwide.
Wipro Gets Phished to Gain Access to Clients
Larry Loeb  
4/18/2019   2 comments
Sources say that the company was being used as the start of 'digital fishing expeditions targeting at least a dozen Wipro customer systems.'
Servers Discovered With Multiple Malware Families, Staged & Ready to Launch
Larry Loeb  
4/17/2019   1 comment
Bromium has uncovered US-based web servers that are being used to host and distribute these kinds of malware including banking trojans, information stealers and ransomware.
Warning: VPN Application Vulnerabilities Found
Larry Loeb  
4/16/2019   6 comments
That enterprise-grade virtual private network might not be as private as you think.
Who Built the 'Taj Mahal'?
Larry Loeb  
4/15/2019   3 comments
While the sophistication of the malware suggests that it is the product of a nation-state, it bears none of the code fingerprints of any known nation-state hacker group.
IoE: The Internet of Espionage
Joe Stanganelli  
4/12/2019   1 comment
As employees live their lives across an increasingly IoT-enabled landscape (with devices often installed discreetly and with hidden functionalities), enterprise security is threatened by outside factors it cannot control.
New Vulnerabilities Found in WP3 WiFi Standard
Larry Loeb  
4/12/2019   2 comments
Two researchers have made mincemeat of the new WPA3 certification.
Majority of Enterprise Firms Lack Active Incident Response Plans
Larry Loeb  
4/11/2019   1 comment
Report found that 77% of respondents indicated they do not have a cybersecurity incident response plan consistently in force across the enterprise.
Report Finds That Industry 4.0 Will Pose New & Old Risks
Larry Loeb  
4/10/2019   Post a comment
Trend Micro thinks the fourth industrial revolution is upon us.
WordPress Vulnerable to SQL Injection
Larry Loeb  
4/9/2019   Post a comment
Security firm Securi has found out that on WordPress versions earlier than 3.4 it will allow an SQL injection vulnerability to occur.
FIN6 Expands Its Range With Ransomware
Larry Loeb  
4/8/2019   Post a comment
The well-known FIN6 group has been spotted trying its luck at a new game: ransomware.
Attackers Use 'Well-Known' Hidden HTTPS Directory to Spread Ransomware & Phishing Pages
Larry Loeb  
4/5/2019   1 comment
Researchers from security firm Zscaler's ThreatLabZ found themselves looking at WordPress and Joomla sites that were serving Shade/Troldesh ransomware (which has been known since 2014), backdoors, redirectors and a variety of phishing pages.
Increased Permissions in Mobile Apps Increases Potential Risk
Larry Loeb  
4/4/2019   27 comments
App user permissions should be justified, but many of them aren't.
Vulnerabilities Found in Kubernetes Container System
Larry Loeb  
4/3/2019   2 comments
Trouble with tarballs and more.
Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems
Steve Durbin  
4/2/2019   1 comment
By 2021, the world will be significantly digitized and connected. The race to develop the next generation of super-intelligent machines will be in full swing and technology will be intertwined with everyday life.
Cisco Router Still Vulnerable to Remote Attack After Attempted Fix
Larry Loeb  
4/2/2019   7 comments
The vendor finally admitted that the security patches it had released in January for the Small Business RV320 and RV325 routers don't work.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.
Android Banking Trojan 'Gustuff' Becomes More Dangerous
Larry Loeb  
3/29/2019   35 comments
New report puts Gustuff into the same threat tier as Anubis, Red Alert, Exobot, LokiBot and BankBot.
Artificial Intelligence in Modern Cybersecurity Operations
George Wrenn  
3/28/2019   12 comments
As a rapidly evolving field of science, AI has become flexible to new approaches and tools allowing even cutting-edge technology such as quantum computing under its umbrella of methods.
Worldwide Study Finds Limited Advances Against Evolving Threats
Larry Loeb  
3/28/2019   16 comments
Security vendor SonicWall has issued its SonicWall Cyber Threat Report based on its experiences in 2018.
Investigation Into LockerGoga Ransomware Finds Flaws in the Code
Larry Loeb  
3/27/2019   12 comments
Preliminary analysis of LockerGoga shows it has, in its current forms, limited ability to spread in a network.
WordPress Zero-Day Vulnerability Found in 'Social Warfare' Plugin
Larry Loeb  
3/26/2019   29 comments
'Social Warfare' was open to attacks through use of a stored Cross-Site Scripting (XSS) vulnerability that was introduced with the latest change made to the plugin (3.5.2).
5 Years of the NIST Cybersecurity Framework
Joe Stanganelli  
3/26/2019   1 comment
With NIST celebrating the five-year anniversary of its widely adopted and recommended Cybersecurity Framework just last month, a look back over the years illustrates how far the Framework has come.
Norsk Hydro: This Is How You React to a Ransomware Breach
Larry Loeb  
3/25/2019   10 comments
The company's response to a massive ransomware attack is an object lesson in how to do it right.
Facebook Exposes Millions of Unencrypted User Passwords
Larry Loeb  
3/22/2019   53 comments
It's an internal matter – but it could affect millions of the social network's users.
FIN7 Resurfaces With New Malware Techniques
Larry Loeb  
3/22/2019   5 comments
The FIN7 group of cyber criminals is still going strong.
Jackson County Still Recovering After Paying Ryuk Ransom
Joe Stanganelli  
3/21/2019   2 comments
Radio silence after reports of a headline-snagging ransomware payment in Jackson County, Ga., presents a possible case study in the pros and cons of paying ransomware attackers.
Evidence Found of Malware Families Collaborating
Larry Loeb  
3/20/2019   9 comments
IBM's X-Force has found that intertwined relationships exist between the Trickbot, Gozi, Ramnit and IcedID malware families – and that spells trouble.
Cyber Attacks Grow by 55% in 2018 & Data Theft Dominates – Report
Larry Loeb  
3/19/2019   11 comments
The findings from Positive Technologies aren't that, erm, positive.
Is Your Supply Chain the Weakest Link?
Steve Durbin  
3/19/2019   2 comments
Despite organizations' best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain.
Study Shows Massive Attacks Bypassing MFA
Larry Loeb  
3/18/2019   9 comments
Multi-factor authentication is no silver bullet for security problems.
New IoT Device Regulation Establishes Base Line for Security
Larry Loeb  
3/15/2019   3 comments
Legislation seeks to use the spending power of the government, which, if the bill goes through, will only be able to acquire those IoT devices that meet the bill's requirements.
North Korea Circumvents Sanctions Through Cybercrime, Says Report
Larry Loeb  
3/14/2019   1 comment
The UN report believes the DPRK has snaffled up half a billion dollars so far through nefarious means.
Convergence: Real Problems When it Comes to Securing the IoT/IIoT
Alan Zeichick  
3/14/2019   Post a comment
Today, enterprises are dealing with a proliferation of connected devices that probably aren't dedicated to computing – think video cameras, inventory sensors, machine tools, thermostats and environmental monitors.
<<   <   Page 2 / 2




Latest Articles
The National Cyber Security Centre, a part of the UK's GCHQ, has issued an advisory that deals with Domain Name System (DNS) hijacking by threat actors.
Cybersecurity firm ESET discovered a Windows zero-day exploit that affects older systems like Windows 7 and Server 2008.
B2B security software is growing faster than overall B2B software sales, according to new figures.
A Zero Trust security posture begins with strong identity and access management.
Machine learning, and neural networks in particular, will become a prime target for those aiming to manipulate or disrupt dependent products and services.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with