Cyber Threat News, Articles and Updates
Bangladesh Central Bank officials are pinning the blame for an cyberattack that netted $81 million from the financial institution on SWIFT's for incorrectly installing new software.
Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.
A House subcommittee hearing Thursday examined state and local government preparedness in case of cyberattack on the U.S. electrical grid.
An advanced persistent threat (APT) attack is a little like a bed bug infestation: If you have one, you can sanitize everything and put protective measures in place, but there's a good chance they'll be back.
The humans are clawing back the interest as new research from Distil networks shows a slight decline in bot traffic for 2015
Yet another hospital, this time in Canada, has been infected with Ransomware.
An APT group based in China, code-named Suckfly, has been concealing its nefarious activity over the past two years by stealing code-signing certificates and applying them to malware and hack tools to make them look legitimate.
DHS and the DOJ issued two sets of guidelines and procedures required by the Cybersecurity Act of 2015.
Trend Micro is reporting that Russian hackers likely attempted to use BlackEnergy malware to attack a mining operation and railway, in addition to taking down two power plants in the Ukraine in December.
Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.
Small businesses and retailers should expect cybercriminals to pay extra attention to them in the coming months with ransomware and point of sale attacks becoming even more common.
Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.
Researchers at Malwarebytes challenge claims the Mac OSX had the most vulnerabilities in 2015.
In the wake of North Korea testing a nuclear device earlier this week, the South Korean military has raised its cybersecurity level as a precautionary measure.
BIMCO today introduced the first set of cybersecurity guidelines for the global shipping industry to help prevent cyber incidents at sea.
Tech support scammers have found a new online base of operations to push their particular breed of malware moving to Rackspace from Amazon Web Services.
Two different groups of researchers at National Institute of Standards and Technology and the University of Oxford published research that puts the encryption-breaking potential of quantum computers one step closer to reality.
Joomla! has released the latest version, 3.4.7, of its free content management system software to address two reported security vulnerabilities.
Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.
No one wants to plan for a breach, but its what you ought to do if you want to minimise the costs, data losses and reputational damage when the inevitable happens, hence the avid pre-planning at last week's SC roundtable.
Security watchers warn of authentication and authorisation flaws in Windows network environments
Researchers at Malwarebytes spotted a phony CSGO Shuffle site that delivers malware to unsuspecting Steam users.
Wisconsin Dells, Wis.-based Kalahari Resorts announced that its Ohio and Wisconsin resorts were hit by a point-of-sale (POS) breach.
Researchers at Trend Micro spotted the ransomware Chimera in the wild offering victims a commission.
Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.
The future of warfare where a cyber component is added to the traditional land, air and sea battles can be seen in the Ukraine as it struggles to fend off cyber groups determined to undermine their war against Russian-backed separatists.
The results of the first FITARA scorecard are in, and it doesn't look good. The Government Accountability Office reviewed 24 government agencies on their progress implementing federal IT reforms.
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.
Mozilla has stepped up pressure on enterprise companies that continue to use SHA-1 certificates after research last month demonstrated the algorithm could be broken in as little as three months.
Most Americans hold the false belief that they have a firm grip on their home network's security level and children's internet activities even though they have taken few steps to ensure that this is true.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Russian hackers take the stage at DNC convention
- TSA master key hackers expose dangers of physical and digital key escrow policies
- Patchwork cyberespionage campaign branches out to strike businesses
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org
- SC wins three top national honors from ASBPE