Stealthy Data Exfiltration Possible via Magnetic Fields

Researchers have demonstrated that a piece of malware present on an isolated computer can use magnetic fields to exfiltrate sensitive data, even if the targeted device is inside a Faraday...
Continue reading
0 Comments

Cryptocurrency Mining Malware Hits Monitoring Systems at European Water Utility

Malware Chewed Up CPU of HMI at Wastewater Facility Cryptocurrency mining malware worked its way onto four servers connected to an operational technology (OT) network at a wastewater facility in...
Continue reading
0 Comments

Bangladesh to File U.S. Suit Over Central Bank Heist

Bangladesh's central bank will file a lawsuit in New York against a Philippine bank over the world's largest cyber heist, the finance minister said Wednesday. Unidentified hackers stole $81 million...
Continue reading
0 Comments

U.S. Announces Takedown of Global Cyber Theft Ring

The US Justice Department announced indictments Wednesday for 36 people accused of running a transnational ring stealing and selling credit card and personal identity data, causing $530 million in losses....
Continue reading
0 Comments

Automation Software Flaws Expose Gas Stations to Hacker Attacks

Gas stations exposed to hacker attacks
Gas stations worldwide are exposed to remote hacker attacks due to several vulnerabilities affecting the automation software they use, researchers at Kaspersky Lab reported on Wednesday. The vulnerable product is...
Continue reading
0 Comments

The Argument Against a Mobile Device Backdoor for Government

Just as the Scope of 'Responsible Encryption' is Vague, So Too Are the Technical Requirements Necessary to Achieve It The 'responsible encryption' demanded by law enforcement and some politicians will...
Continue reading
0 Comments

Capable Luminosity RAT Apparently Killed in 2017

The prevalence of the Luminosity remote access Trojan (RAT) is fading away after the malware was supposedly killed half a year ago, Palo Alto Networks says. First seen in April...
Continue reading
0 Comments

Questionable Interpretation of Cybersecurity's Hidden Labor Cost

Report Claims a 2,000 Employee Organization Spends $16 Million Annually on Incident Triaging The de facto standard for cybersecurity has always been detect and respond: detect a threat and respond...
Continue reading
0 Comments

Don't be a "CIS-No," Regain Control of your Data

Just like all things security, yet another new concept has taken the market by storm, being repeated over and over again. The perimeter is dead. We are living in a...
Continue reading
0 Comments

Risky Business (Part 3): The Beauty of Risk Transfer

Previously, I’ve talked about four primary risk treatment options : mitigate, avoid, accept, and transfer.  Over the history of the security industry, we’ve tended to focus on mitigation. Implementing controls...
Continue reading
0 Comments

XSS, SQL Injection Flaws Patched in Joomla

One SQL injection and three cross-site scripting (XSS) vulnerabilities have been patched with the release of Joomla 3.8.4 last week. The latest version of the open-source content management system (CMS)...
Continue reading
0 Comments

Hackers From Florida, Canada Behind 2016 Uber Breach

Uber shares more details about 2016 data breach
Two individuals living in Canada and Florida were responsible for the massive data breach suffered by Uber in 2016, the ride-sharing company’s chief information security officer said on Tuesday. In...
Continue reading
0 Comments

Proofpoint to Acquire Security Awareness Training Firm Wombat Security for $225 Million

Proofpoint Logo
Cybersecurity firm Proofpoint on Tuesday announced that it has agreed to acquire Wombat Security Technologies for $255 million in cash.  Wombat, which helps companies educate employees on the dangers of...
Continue reading
0 Comments

Business Wire Hit by Ongoing DDoS Attack

Newswire service Business Wire said Tuesday that it has been under a sustained Distributed Denial of Service (DDoS) attack for almost a week.  The company said that since last Wednesday,...
Continue reading
0 Comments

Fitness Dystopia in the Age of Self-Surveillance

Fitness Dystopia in the Age of Self-Surveillance
image
image
image
image
Cybersecurity , Data Breach , Privacy Fitness Dystopia in the Age of Self-Surveillance Big Brother, Meet Wearable Fitness Devices( euroinfosec ) • February 5, 2018    Online service providers are...
Continue reading
0 Comments

Blockchain for Identity: 6 Hot Projects

Blockchain for Identity: 6 Hot Projects
image
image
image
image
image
image
image
ID & Access Management , Technology Blockchain for Identity: 6 Hot Projects Distributed Ledgers for Identity and Access Management Have Great Promise( jeremy_kirk ) • February 5, 2018    Blockchain...
Continue reading
0 Comments

Let's Go Threat Hunting - Expert Tips for Enhancing Hunting in your Organization

Bio Image
Bio Image
You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

Live Webinar: Threat Intelligence - Hype or Hope?

Bio Image
You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

Accused Russian Botnet Mastermind Extradited to US

Accused Russian Botnet Mastermind Extradited to US
image
Fraud , Ransomware , Technology Peter Levashov Allegedly Distributed Spam, Ransomware via Kelihos Botnet( euroinfosec ) • February 5, 2018    Peter Levashov, in an undated picture. (Photo: Maria Levashov)...
Continue reading
0 Comments

British Hacking Suspect Avoids Extradiction

British Hacking Suspect Avoids Extradiction
Data Breach Lauri Love Wins Appeal, But Faces Prosecution in England( euroinfosec ) • February 5, 2018    Lauri Love speaks outside court on Feb. 5. (Photo: Courage Foundation )...
Continue reading
0 Comments