State of Malware: Attacks on Business Grow as Threats Become More Sophisticated

Malware Trends Report
The 2019 State of Malware report from Malwarebytes is packed with statistics on when, where and what malware was detected through 2018. One trend and one fact stand out: consumer detections are...
Continue reading
0 Comments

Identity Management Firm Keyfactor Raises $77 Million

Identity management solutions provider Keyfactor on Thursday announced that it raised $77 million in a growth funding round with venture capital and private equity firm Insight Venture Partners. According to...
Continue reading
0 Comments

U.S. Senators Voice Cyber Concerns Over China-Made Metro Rail Cars

A group of United States Senators have written a letter to the Washington Metropolitan Area Transit Authority (WMATA) to express safety and security concerns regarding the acquisition of metro rail...
Continue reading
0 Comments

Link Found Between GreyEnergy and Zebrocy Attacks

Researchers from Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) have found significant overlaps in GreyEnergy and Zebrocy activity, both of which were previously linked to Russia....
Continue reading
0 Comments

Cisco Patches Flaws in Webex, SD-WAN, Other Products

Cisco on Wednesday informed customers that security updates are available for several of the company’s products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business...
Continue reading
0 Comments

Attackers Use Steganography to Obfuscate PDF Exploits

A recently discovered PDF exploit used steganography to hide malicious JavaScript code in images embedded in PDF files, according to exploit analysis firm EdgeSpot. Steganography is a method of hiding...
Continue reading
0 Comments

Enhance Your Security Posture Through Security Services

Cybercriminals are continually changing their attacks and techniques to stay ahead of security countermeasures. This continuous threat evolution has forced organizations to be consistently prepared to defend against something new...
Continue reading
0 Comments

Understand More About Phishing Techniques to Reduce Your Digital Risk

According to Phishing.org, the practice of phishing started around 1995. Nearly 25 years later, phishing is still used by attackers of all levels of sophistication. The 2018 Verizon Data Breach...
Continue reading
0 Comments

EU-Japan Deal to Protect Data Exchanges Takes Effect

The European Union and Japan on Wednesday launched the "world's largest areas of safe data flows" after finalizing common rules to protect personal information, the EU said. Firms can transfer...
Continue reading
0 Comments

Apple Patches Dozens of Vulnerabilities in iOS, macOS

Apple this week released new updates for iOS and macOS users to address tens of security vulnerabilities and other bugs in the two platforms. A total of 31 security flaws...
Continue reading
0 Comments

Code Execution Vulnerability Impacts Linux Package Manager

A remote code execution vulnerability was recently discovered in APT, the high level package manager used in many Linux distributions.  Tracked as CVE-2019-3462 , the software bug could be exploited...
Continue reading
0 Comments

WhiteHat Security Launches New Software Testing Products

WhiteHat Security launches new Essentials product line
Application security firm WhiteHat Security on Tuesday announced the general availability of a new product line designed to help organizations conduct comprehensive code analysis. The new line, named Essentials ,...
Continue reading
0 Comments

Recorded Future Adds Third-Party Risk to Threat Intelligence Platform

Recorded Future Logo
Over the last few years, the supply chain has emerged as a primary attack vector for both criminal gangs and nation-state groups. Attackers are compromising often smaller and less well-defended...
Continue reading
0 Comments

Flaws in Moxa IIoT Product Expose ICS to Remote Attacks

Serious vulnerabilities found in an industrial IoT (IIoT) platform from Moxa could enable malicious hackers to launch remote attacks on industrial networks. The vendor has released a patch that should...
Continue reading
0 Comments

Webinar With VirusTotal: Intelligence Powered Malware Hunting (On Demand)

VirusTotal Webinar
Register Now
Presented by VirusTotal Shows How to Leverage Threat Data to Find and Shut Down New Malware Attacks  You're invited to view the on demand webinar by VirusTotal and SecurityWeek where we...
Continue reading
0 Comments

Alphabet's Jigsaw Helps Users Identify Phishing Attacks

Jigsaw phishing quiz
Jigsaw, a unit of Google’s parent company Alphabet, on Tuesday made available a quiz that tests users’ ability to identify phishing attacks and teaches them what signs to look for...
Continue reading
0 Comments

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Nest urged owners of its security cameras Tuesday to use enhanced authentication to thwart hackers, after one terrified a family with a hoax nuclear missile attack. A couple living in...
Continue reading
0 Comments

Community Project Crushes 100,000 Malware Sites in 10 Months

Nearly 100,000 malware distribution websites have been identified and taken down over the course of 10 months as part of an abuse.ch project called URLhaus.  Launched at the end of...
Continue reading
0 Comments

Unofficial Patches Released for Three Unfixed Windows Flaws

ACROS Security’s 0patch service has released unofficial patches for three Windows vulnerabilities that Microsoft has yet to address, including denial-of-service (DoS), file read, and code execution issues. The patches have...
Continue reading
0 Comments

GDPR Complaints Filed Against Eight International Streaming Companies

European NGO noyb ('none of your business') filed ten GDPR-related complaints against eight international streaming services on January 18, 2019. The complaints allege that the concerned streaming services have not...
Continue reading
0 Comments