Cyber Threat News, Articles and Updates
Researchers spotted a new information stealing trojan, dubbed Shakti, that may be of Indian origin and is designed for corporate espionage.
Creators of the rival Petya and Mischa ransomware programmes have leaked the private keys of Chimera ransomware.
Bangladesh Central Bank officials are pinning the blame for an cyberattack that netted $81 million from the financial institution on SWIFT's for incorrectly installing new software.
Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.
A House subcommittee hearing Thursday examined state and local government preparedness in case of cyberattack on the U.S. electrical grid.
An advanced persistent threat (APT) attack is a little like a bed bug infestation: If you have one, you can sanitize everything and put protective measures in place, but there's a good chance they'll be back.
The humans are clawing back the interest as new research from Distil networks shows a slight decline in bot traffic for 2015
Yet another hospital, this time in Canada, has been infected with Ransomware.
An APT group based in China, code-named Suckfly, has been concealing its nefarious activity over the past two years by stealing code-signing certificates and applying them to malware and hack tools to make them look legitimate.
DHS and the DOJ issued two sets of guidelines and procedures required by the Cybersecurity Act of 2015.
Trend Micro is reporting that Russian hackers likely attempted to use BlackEnergy malware to attack a mining operation and railway, in addition to taking down two power plants in the Ukraine in December.
Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.
Small businesses and retailers should expect cybercriminals to pay extra attention to them in the coming months with ransomware and point of sale attacks becoming even more common.
Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.
Researchers at Malwarebytes challenge claims the Mac OSX had the most vulnerabilities in 2015.
In the wake of North Korea testing a nuclear device earlier this week, the South Korean military has raised its cybersecurity level as a precautionary measure.
BIMCO today introduced the first set of cybersecurity guidelines for the global shipping industry to help prevent cyber incidents at sea.
Tech support scammers have found a new online base of operations to push their particular breed of malware moving to Rackspace from Amazon Web Services.
Two different groups of researchers at National Institute of Standards and Technology and the University of Oxford published research that puts the encryption-breaking potential of quantum computers one step closer to reality.
Joomla! has released the latest version, 3.4.7, of its free content management system software to address two reported security vulnerabilities.
Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.
No one wants to plan for a breach, but its what you ought to do if you want to minimise the costs, data losses and reputational damage when the inevitable happens, hence the avid pre-planning at last week's SC roundtable.
Security watchers warn of authentication and authorisation flaws in Windows network environments
Researchers at Malwarebytes spotted a phony CSGO Shuffle site that delivers malware to unsuspecting Steam users.
Wisconsin Dells, Wis.-based Kalahari Resorts announced that its Ohio and Wisconsin resorts were hit by a point-of-sale (POS) breach.
Researchers at Trend Micro spotted the ransomware Chimera in the wild offering victims a commission.
Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.
The future of warfare where a cyber component is added to the traditional land, air and sea battles can be seen in the Ukraine as it struggles to fend off cyber groups determined to undermine their war against Russian-backed separatists.
The results of the first FITARA scorecard are in, and it doesn't look good. The Government Accountability Office reviewed 24 government agencies on their progress implementing federal IT reforms.
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.
SC Magazine Articles
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- The Shadow Brokers' NSA hack claim unlikely, say experts
- After the breach: Settlement expected for 50M Home Depot customers
- Don't get caught by the Pokemon Go ransomware
- WikiLeaks postings of Turkish emails included active links to malware
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- After NSA leaks, a renewed interest in vulnerability disclosure
- USAA members hit with multiple phishing attacks
- Saving money on security software by improving cyber posture, report
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Epic hack, thousands of salted logins stolen