Cyber Threat News, Articles and Updates

Belgian minister of defence stresses investing in cyber-security

Belgian minister of defence stresses investing in cyber-security

Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.

House subcommittee examines preparedness for electrical grid cyberattack

House subcommittee examines preparedness for electrical grid cyberattack

By

A House subcommittee hearing Thursday examined state and local government preparedness in case of cyberattack on the U.S. electrical grid.

 Dissecting an APT attack

Dissecting an APT attack

By

An advanced persistent threat (APT) attack is a little like a bed bug infestation: If you have one, you can sanitize everything and put protective measures in place, but there's a good chance they'll be back.

Bot traffic on the descent: Will the real GET request please stand up?

Bot traffic on the descent: Will the real GET request please stand up?

The humans are clawing back the interest as new research from Distil networks shows a slight decline in bot traffic for 2015

Canadian hospital infected with ransomware

Canadian hospital infected with ransomware

Yet another hospital, this time in Canada, has been infected with Ransomware.

'Suckfly' in the ointment: Chinese APT group steals code-signing certificates

'Suckfly' in the ointment: Chinese APT group steals code-signing certificates

By

An APT group based in China, code-named Suckfly, has been concealing its nefarious activity over the past two years by stealing code-signing certificates and applying them to malware and hack tools to make them look legitimate.

DHS, DOJ issue guidelines, procedures for sharing cyber threats

DHS, DOJ issue guidelines, procedures for sharing cyber threats

By

DHS and the DOJ issued two sets of guidelines and procedures required by the Cybersecurity Act of 2015.

BlackEnergy evolving to attack new sectors

BlackEnergy evolving to attack new sectors

By

Trend Micro is reporting that Russian hackers likely attempted to use BlackEnergy malware to attack a mining operation and railway, in addition to taking down two power plants in the Ukraine in December.

U.S., Australia vow to take on ISIS cyberthreat together

U.S., Australia vow to take on ISIS cyberthreat together

By

Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.

Ransomware and POS attackers to zero in on small businesses, retailers

Ransomware and POS attackers to zero in on small businesses, retailers

By

Small businesses and retailers should expect cybercriminals to pay extra attention to them in the coming months with ransomware and point of sale attacks becoming even more common.

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

By

Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.

Not so fast, was OS X really the most vulnerable of 2015?

Not so fast, was OS X really the most vulnerable of 2015?

By

Researchers at Malwarebytes challenge claims the Mac OSX had the most vulnerabilities in 2015.

South Korea boosts cyberdefenses against the DPRK

South Korea boosts cyberdefenses against the DPRK

By

In the wake of North Korea testing a nuclear device earlier this week, the South Korean military has raised its cybersecurity level as a precautionary measure.

BIMCO releases first cybersecurity guidelines for shipping industry

BIMCO releases first cybersecurity guidelines for shipping industry

By

BIMCO today introduced the first set of cybersecurity guidelines for the global shipping industry to help prevent cyber incidents at sea.

Tech support scammers using Rackspace to help ply their trade

Tech support scammers using Rackspace to help ply their trade

By

Tech support scammers have found a new online base of operations to push their particular breed of malware moving to Rackspace from Amazon Web Services.

Researchers bring encryption-defying quantum computers one step closer

Researchers bring encryption-defying quantum computers one step closer

By

Two different groups of researchers at National Institute of Standards and Technology and the University of Oxford published research that puts the encryption-breaking potential of quantum computers one step closer to reality.

Joomla! New Version Fixes Security Flaws

Joomla! New Version Fixes Security Flaws

By

Joomla! has released the latest version, 3.4.7, of its free content management system software to address two reported security vulnerabilities.

DDoS attacks up 180 percent in Q3 2015: Akamai

DDoS attacks up 180 percent in Q3 2015: Akamai

By

Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.

How to prepare for the inevitable: SC Roundtable sponsored by FireEye Mandiant

How to prepare for the inevitable: SC Roundtable sponsored by FireEye Mandiant

No one wants to plan for a breach, but its what you ought to do if you want to minimise the costs, data losses and reputational damage when the inevitable happens, hence the avid pre-planning at last week's SC roundtable.

'Devastating flaws' in Kerberos authentication protocol

'Devastating flaws' in Kerberos authentication protocol

Security watchers warn of authentication and authorisation flaws in Windows network environments

Phony 'Steam escrow' site used to deliver malware

Phony 'Steam escrow' site used to deliver malware

By

Researchers at Malwarebytes spotted a phony CSGO Shuffle site that delivers malware to unsuspecting Steam users.

Kalahari Resorts hit by POS breach

By

Wisconsin Dells, Wis.-based Kalahari Resorts announced that its Ohio and Wisconsin resorts were hit by a point-of-sale (POS) breach.

Ransomware Chimera is back, offering victims commission

Ransomware Chimera is back, offering victims commission

By

Researchers at Trend Micro spotted the ransomware Chimera in the wild offering victims a commission.

Cryptowall 4.0 spotted in nuclear exploit kit

Cryptowall 4.0 spotted in nuclear exploit kit

By

Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.

Cyber and real war come together in the Ukraine

Cyber and real war come together in the Ukraine

By

The future of warfare where a cyber component is added to the traditional land, air and sea battles can be seen in the Ukraine as it struggles to fend off cyber groups determined to undermine their war against Russian-backed separatists.

House Oversight Committee gives failing grades on cybersecurity progress

House Oversight Committee gives failing grades on cybersecurity progress

By

The results of the first FITARA scorecard are in, and it doesn't look good. The Government Accountability Office reviewed 24 government agencies on their progress implementing federal IT reforms.

Jaguar car hack in New Zealand

Jaguar car hack in New Zealand

A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.

Mozilla may reject SHA-1 certificates six months early

Mozilla may reject SHA-1 certificates six months early

By

Mozilla has stepped up pressure on enterprise companies that continue to use SHA-1 certificates after research last month demonstrated the algorithm could be broken in as little as three months.

Consumers oddly confident in their cybersecurity, even as their data is stolen

Consumers oddly confident in their cybersecurity, even as their data is stolen

By

Most Americans hold the false belief that they have a firm grip on their home network's security level and children's internet activities even though they have taken few steps to ensure that this is true.

Akhter twins sentenced to prison for hacking State Dept.

Akhter twins sentenced to prison for hacking State Dept.

By

Twin brothers Muneeb and Sohaib Akhter were sentenced to prison by the Eastern District of Virginia for an array of offenses, including conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization, conspiracy to access a government computer without authorization, and obstruction of justice.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US