State Department Official Who Backs Russian Cyber Engagement Leaving

State Department Official Who Backs Russian Cyber Engagement Leaving
Cybersecurity , Privacy , Risk Management State Department Official Who Backs Russian Cyber Engagement Leaving Christopher Painter Departs at Month's End as First U.S. Cyber Diplomat Eric Chabrow ( GovInfoSecurity...
Continue reading
0 Comments

IoT in the Enterprise: The Next Big Thing


Endpoint Security , Risk Management , Technology Phil Marshall of Tolaga Research on Managing Emerging Risks Tom Field ( SecurityEditor ) • July 20, 2017     Phil Marshall, chief...
Continue reading
0 Comments

FBI Blames Iranian Hackers for Stealing US Missile Tech

FBI Blames Iranian Hackers for Stealing US Missile Tech
image
image
Cybersecurity , Data Loss Export-Restricted Software Helps Develop Rockets, Missiles and Other Weapons Mathew J. Schwartz ( euroinfosec ) • July 20, 2017     An M777A2 155 mm Howitzer...
Continue reading
0 Comments

Russian Citadel Malware Developer Gets 5-Year Sentence

Russian Citadel Malware Developer Gets 5-Year Sentence
image
Fraud Notorious Banking Trojan Tied to 11 Million Infections, $500 Million in Losses Mathew J. Schwartz ( euroinfosec ) • July 20, 2017     Citadel bot-building screen. (Source: Malwarebytes)...
Continue reading
0 Comments

Police Seize World's Two Largest Darknet Marketplaces

Police Seize World's Two Largest Darknet Marketplaces
Cybersecurity , Risk Management AlphaBay Shutdown Drove Users to Hansa, Where Police Were Already in Control Mathew J. Schwartz ( euroinfosec ) • July 20, 2017     Takedown notices...
Continue reading
0 Comments

Defenders Gaining on Attackers, But Attacks Becoming More Destructive: Cisco

view counter
image


Cisco Publishes 2017 Midyear Cybersecurity Report Cisco's just-released Midyear Cybersecurity Report ( PDF ) draws on the accumulated work of the Cisco Security Research members. The result shows some improvement...
Continue reading
0 Comments

Hacker Steals $30 Million in Ethereum from Parity Wallets

view counter
image


A hacker was allegedly able to exploit a vulnerability in Ethereum wallet client Parity and steal over $30 million worth of crypto-currency. Because of a security flaw in the Parity...
Continue reading
0 Comments

U.S., European Police Say 'Dark Web' Markets Shut Down

view counter
image


Washington - US and European police on Thursday announced the shutdown of two huge "dark web" marketplaces that allowed the anonymous online trade of drugs, hacking software and guns. Underground...
Continue reading
0 Comments

New CyberX Technology Predicts ICS Attack Vectors

CyberX ICS Attack Vector Prediction
view counter
image


Industrial cybersecurity and threat intelligence firm CyberX announced on Thursday the availability of a new simulation technology that allows organizations to predict breach and attack vectors on their networks. The...
Continue reading
0 Comments

Avast Acquires CCleaner Developer Piriform

view counter
image


Antivirus firm Avast announced on Wednesday the acquisition of Piriform, a London, UK-based company that develops the popular cleaning and optimization tool CCleaner. While the Piriform staff will join Avast’s...
Continue reading
0 Comments

FedEx May Have Permanently Lost Data Encrypted by NotPetya

view counter
image


FedEx-owned international delivery services company TNT Express is still working on restoring systems hit last month by the destructive NotPetya malware attack, but some business data may never be recovered,...
Continue reading
0 Comments

Firms Unite to Hunt Threats From Network to Endpoint

view counter
image


Network and Endpoint Threat Hunters Corvil and Endgame Combine to Provide Pan-Infrastructure Detection and Response Two threat hunting and detection companies have integrated their products to give greater visibility and...
Continue reading
0 Comments

Tor Offers $4,000 Per Flaw in Public Bug Bounty Program

Tor launches bug bounty program
view counter
image


The Tor Project announced on Thursday the launch of a public bug bounty program. Researchers can earn thousands of dollars if they find serious vulnerabilities in the anonymity network. The...
Continue reading
0 Comments

The Art of Measuring Security Success

Measuring Security Effectiveness 
view counter
image


It’s Time to Stop Measuring Security Success by Only Internal, Readily-available Metrics As the budget planning season approaches, discussions of how to measure security success to justify resource allocation or...
Continue reading
0 Comments

Apple Patches Vulnerabilities Across All Platforms

view counter
image


Apple this week released security patches for all four of its operating systems to resolve tens of security bugs in each of them. The tech giant addressed 37 vulnerabilities with...
Continue reading
0 Comments

Segway miniPRO Flaws Put Riders at Risk of Injury

Segway vulnerabilities
view counter
image


The Ninebot by Segway miniPRO hoverboard-style electric scooter is affected by several vulnerabilities that can be exploited to take control of the device and possibly injure the rider, security consulting...
Continue reading
0 Comments

CrowdStrike, Dragos Partner on ICS Security Services

CrowdStrike and Dragos announce new partnership
view counter
image


Cloud-based endpoint security firm CrowdStrike and Dragos, a company that specializes in protecting industrial control systems (ICS), announced on Tuesday a strategic partnership whose goal is to provide comprehensive cybersecurity...
Continue reading
0 Comments

Overcoming Appeasement: Think About Risk From the Business Out

The Role of Chief Information Security Officer
view counter
image


For a couple of decades now, the career path of a cybersecurity professional has been evolving just like the rest of the tech industry. Years ago the top title was...
Continue reading
0 Comments

'DarkHotel' APT Uses New Methods to Target Politicians

view counter
image


The DarkHotel threat group has been using some new methods in attacks aimed at government employees with an interest in North Korea, according to a report published this week by...
Continue reading
0 Comments

Google Warns Users of Potentially Risky Web Apps

view counter
image


Google is taking another step to better protect users from malicious third-party web applications: it is now warning users of newly created web apps and Apps Scripts that are pending...
Continue reading
0 Comments