Latest News


Adobe patches Connect untrusted search path vulnerability

A security update for Adobe Connect for Windows released Monday resolves an untrusted search path vulnerability in the add-in installer for Connect versions 9.5.2 and earlier.


GCHQ infosec group disclosed kernel privilege exploit to Apple

GCHQ's infosec unit CESG was credited with the discovery of two vulnerabilities that were patched by Apple last week.


Bratton: NYC gangs turning to cybercrime, encryption thwarting investigations

As serious crime stats drop in New York City, gangs are becoming more adept at cybercrime, according to Police Commissioner Bill Bratton.


Researcher brute forces Instagram, cites multiple internal flaws

Information security bug-bounty hunter Arne Swinnen used several flaws with Instagram's login system to brute force his way into the social media giant and gain access to member accounts.


Changing of the TidePool: Operation Ke3chang malware evolves as APT threat reappears

Operation Ke3chang, the APT that in 2013 was discovered targeting Europe-based Ministries of Foreign Affairs, not only apparently remains active but also seems to be leveraging a new family of malware called TidePool.

Data Breach Blog

San Juan County DWI program patient data compromised

Information on patients in New Mexico's San Juan County DWI treatment program may have been compromised.

Children's National Health System breached, data of 4K patients compromised

More than 4,000 patients of the Children's National Health System received notices of a data breach following a former vendor disclosing patient health information on an FTP site viewable on the web.

San Mateo Foster City School District employee PII compromised in breach

The San Mateo Foster City School District (SMFCSD) reported that personal information of active employees was compromised.

Featured News

Petya and Mischa ransomware bundled in one malicious payload

Petya and Mischa ransomware bundled in one malicious payload

Researchers spotted Petya and Mischa ransomware bundled together in a single malicious payload.

May issue now available!

SC Congress Atlanta Slideshow

A photo montage of the inaugural SC Congress Atlanta held on May 17.

Click on the image or here to see the show.

May 2016 Product Reviews

AlienVault Unified Security Management Platform

Significant, mature next-generation blend of SIEM and UTM capabilities at a very reasonable price. Outstanding customer relationship building.

LogRhythm Security Intelligence Platform

Probably the most complete pure-play SIEM we’ve seen with the added benefit of many next-gen features and superlative correlation and analytics.

CorreLog SIEM Correlation Server

Excellent price point for a very flexible SIEM/log correlator with lots of features.

The Threat Hunter Blog

Next up. A look at Locky Ransomware

Next up. A look at Locky Ransomware

We've been examining some of the newer - or, at least, most currently prevalent - strains of ransomware. This time we look at Locky.


Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.


Sign up to our newsletters