A Venture Capitalist's 2018 Outlook

A Venture Capitalist's 2018 Outlook Trident's Alberto Yépez on Hot Technologies and Market Trends) • January 17, 2018     20 Minutes    As a longtime investor in companies offering cybersecurity...
Continue reading
0 Comments

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers
image
Anti-Malware , Breach Preparedness , Data Breach With Jarvis, BlackBerry Targets Connected - and Driverless - Vehicle Security( jeremy_kirk ) • January 17, 2018    BlackBerry CEO John Chen announces...
Continue reading
0 Comments

Anatomy of a Cryptocurrency Phishing Campaign

Anatomy of a Cryptocurrency Phishing Campaign
image
image
image
Data Breach , Fraud , Risk Management North Korea Keeps Hacking for Bitcoins, Researchers Say( euroinfosec ) • January 17, 2018    Phishing attack tries to trick recipients into entering...
Continue reading
0 Comments

Intel Confirms Fresh Spectre, Meltdown Patch Problems

Intel Confirms Fresh Spectre, Meltdown Patch Problems
image
Breach Preparedness , Data Breach , Endpoint Security Latest CPUs Also Suffer From Frequent Rebooting Problem( euroinfosec ) • January 18, 2018     Intel says the firmware updates it...
Continue reading
0 Comments

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time
image
Litigation 'Caliconnect' Earned $1.4 Million on Silk Road Before Its Demise( euroinfosec ) • January 18, 2018    Police seized control of the AlphaBay darknet market on July 4, 2017....
Continue reading
0 Comments

Triton Malware Exploited Zero-Day in Schneider Electric Devices

The recently discovered malware known as Triton and Trisis exploited a zero-day vulnerability in Schneider Electric’s Triconex Safety Instrumented System (SIS) controllers in an attack aimed at a critical infrastructure...
Continue reading
0 Comments

Cloudflare Launches Remote Access to Replace Corporate VPNs

Mobile and cloud computing have challenged the concept of perimeter security. There is no longer an easily definable perimeter to defend. VPNs are a traditional, but not ideal solution. Neither...
Continue reading
0 Comments

Booby-Trapped Messaging Apps Used for Spying: Researchers

An espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries, researchers said in a report Thursday....
Continue reading
0 Comments

Russia-Linked Attacks on Political Organizations Continue

The cyber-espionage group known as Fancy Bear was highly active in the second half of 2017, hitting political organizations worldwide, Trend Micro said this week. Also known as APT28, Pawn...
Continue reading
0 Comments

Common Approaches to Automated Application Security Testing - SAST and DAST

Dynamic and Static Application Security Testing
Not All Automated Software Security Assessment Approaches Are Created Equal When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the...
Continue reading
0 Comments

Intel Tests Performance Impact of CPU Patches on Data Centers

Performance penalties of Intel patches on data centers
Intel Patches for Meltdown and Spectre Cause More Frequent Reboots Intel on Wednesday shared information on the performance impact of the Meltdown and Spectre patches on data centers, and the...
Continue reading
0 Comments

Google Brings Security Analytics to G Suite

Google this week announced security center for G Suite, a tool that brings together security analytics, actionable insights, and best practice recommendations from Google.  The new tool provides a snapshot of...
Continue reading
0 Comments

Cisco Patches Flaws in Email Security, Other Products

Cisco has patched several high severity vulnerabilities, including ones that allow privilege escalation and denial-of-service (DoS) attacks, in its Unified Customer Voice Portal (CVP), Email Security, and NX-OS products. Software...
Continue reading
0 Comments

Researchers Earn $100,000 for Hacking Pixel Phone

A team of researchers has earned more than $100,000 from Google for an Android exploit chain that can be used to hack the company’s Pixel phone remotely simply by getting...
Continue reading
0 Comments

Zyklon Malware Delivered via Recent Office Flaws

A piece of malware known as Zyklon has been delivered by cybercriminals using some relatively new vulnerabilities in Microsoft Office, FireEye reported on Wednesday. Zyklon has been around since early...
Continue reading
0 Comments

Stack Ranking SSL Vulnerabilities: The ROBOT Attack

Forward Secrecy Chart
Vulnerability Impact Score Chart
At least two additional security vendors, including IBM and Palo Alto Networks, have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the...
Continue reading
0 Comments

Briton Pleads Guilty to Running Malware Services

Goncalo Esteves, a 24-year-old man from the United Kingdom, has pleaded guilty to charges related to creating and running services designed to help cybercriminals develop malware that would not be...
Continue reading
0 Comments

Threat Actors Quickly Adopt Effective Exploits

Cybercriminals and nation state groups were quick to adopt the most effective exploits last year, a new AlienVault report reveals. Not only do the most effective exploits proliferate quickly between...
Continue reading
0 Comments

Crypto-Mining Attack Targets Web Servers Globally

A new malware family is targeting web servers worldwide in an attempt to ensnare them into a crypto-mining botnet, security researchers have discovered. Dubbed RubyMiner, the threat was discovered last...
Continue reading
0 Comments

Threat Intelligence Tech Firm Anomali Raises $40 Million

Anomali Logo
Anomali, a security technology firm that offers a SaaS-based threat intelligence platform, today announced that it has raised $40 million in series D funding.  The additional funding brings the total...
Continue reading
0 Comments