Google Won't Use Artificial Intelligence for Weapons

Google announced Thursday it would not use artificial intelligence for weapons or to "cause or directly facilitate injury to people," as it unveiled a set of principles for these technologies....
Continue reading
0 Comments

Cryptocurrency Theft Tops $1 Billion in Past Six Months

$1.1 billion has been stolen in cryptocurrency thefts over the last six months. This is the visible effect of an illicit dark web market economy which is reportedly worth $6.7...
Continue reading
0 Comments

Serious Flaws Found in Philips Patient Monitoring Devices

Vulnerabilities found in Philips fetal monitoring system
Researchers have discovered serious vulnerabilities in patient monitoring devices from Philips. The vendor has shared some recommendations for mitigating the risks until patches are made available. A total of three...
Continue reading
0 Comments

Triton ICS Malware Developed Using Legitimate Code

Triconex controller targeted by Triton ICS malware
The developers of Triton, a recently discovered piece of malware designed to target industrial control systems (ICS), reverse engineered a legitimate file in an effort to understand how the targeted...
Continue reading
0 Comments

Russian Cyberspies Change Tactics in Recent Campaign

Recently observed attacks orchestrated by the Russian threat group Sofacy have revealed a change in tactics and new iterations of previously known tools, according to Palo Alto Networks researchers. Also...
Continue reading
0 Comments

U.S. in Deal to Ease Sanctions on China's ZTE: Top Official

US officials reached a deal Thursday to ease sanctions which threatened to cripple Chinese smartphone maker ZTE, Commerce Secretary Wilbur Ross said. Ross told CNBC television the deal includes a...
Continue reading
0 Comments

Where There's a Will, There's a Way; Beyond Dark Web Marketplaces

Nearly a year has passed since the takedowns of AlphaBay and Hansa by law enforcement efforts that left many speculating about the future of dark web marketplaces. Expectations of an...
Continue reading
0 Comments

GDPR: A Four-letter Word With Global Ramifications

For the past year or so, organizations have worked tirelessly to ensure that they were in compliance by the time the GDPR deadline hit on May 25 . Well, the...
Continue reading
0 Comments

Teen Arrested for Hacking Minnesota Government Systems

The United States Department of Justice this week announced the arrest of an individual charged with the hacking of servers owned by the State of Minnesota. The suspect, Cameron Thomas...
Continue reading
0 Comments

'RedEye' Ransomware Destroys Files, Rewrites MBR

A newly discovered piece of ransomware appears mainly created to destroy the victim’s files instead of encrypting and holding them for ransom. Dubbed RedEye, the malware appears to be the...
Continue reading
0 Comments

Data Classification Firm DocAuthority Raises $10 Million

Israeli startup firm DocAuthority has raised $10 million in a Series A funding round led by Raine Ventures, with the participation of Greycroft, ffVC, Differential VC in the US, and...
Continue reading
0 Comments

Adobe Patches Flash Zero-Day Exploited in Targeted Attacks

[Updated] Security updates released by Adobe on Thursday for Flash Player patch four vulnerabilities, including a critical flaw that has been exploited in targeted attacks. The vulnerability that has been...
Continue reading
0 Comments

Group That Caused Power Outage Stops Focusing Exclusively on Ukraine

Electrum, the Russia-linked hacker group believed to be responsible for the 2016 power outage in Ukraine, no longer focuses exclusively on this country, according to industrial cybersecurity firm Dragos. Electrum...
Continue reading
0 Comments

AXA Partners With SecurityScorecard to Set Cyber Insurance Premiums

AXA Will Use Ratings From SecurityScorecard to Help Set Premiums for Insurance Agreements Cyber insurance is a problem. It is a new industry with huge potential but great difficulties. Getting...
Continue reading
0 Comments

The Future of GDPR - Dead, Diluted, Detested or Accepted?

“ GDPR Day ” (May 25th, 2018) has brought a flood of activity. For example, most of us have experienced an overload of updated privacy statements in our inboxes, which...
Continue reading
0 Comments

The Diminishing Returns of Our Constantly Growing Security Stacks

A couple of years ago, I had a conversation with a CISO that has stuck with me. His Board of Directors had dramatically increased the security budget without his prompting....
Continue reading
0 Comments

Facebook Deals With Chinese Firm Draw Ire From U.S. Lawmakers

Facebook drew fresh criticism from US lawmakers following revelations that it allowed Chinese smartphone makers , including one deemed a national security threat, access to user data. The world's largest...
Continue reading
0 Comments

Critical Vulnerability Addressed in Popular Code Libraries

A critical and widespread arbitrary file overwrite vulnerability has been addressed in popular libraries of projects from HP, Amazon, Apache, Pivotal, and more. Dubbed Zip Slip and discovered by the...
Continue reading
0 Comments

10 Hot Sessions: Infosecurity Europe in London

10 Hot Sessions: Infosecurity Europe in London
image
image
Artificial Intelligence & Machine Learning , Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime 10 Hot Sessions: Infosecurity Europe in London Cybersecurity Conference Tackles Cybercrime, AI, Breach Response, Privacy,...
Continue reading
0 Comments

Analysis: Data Breach Litigation Trends

Analysis: Data Breach Litigation Trends Attorney John Yanchunis Discusses the Latest Lawsuits) • June 5, 2018     15 Minutes    Just as the cyberthreat landscape is evolving, so too are...
Continue reading
0 Comments