Cyberthreats News, Articles and Updates
Two recent reports warn of the dangers of over-reliance on perimeter security as an enterprise defense method.
The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.
A technical committee that provides guidance to the Federal Aviation Administration has reportedly developed drafting recommendations for strengthening the aviation industry's cybersecurity posture.
In a settlement, the hotel chain operated by Republican presidential candidate Donald Trump will fork over $500K in fines and improve the security of its computer network.
Even though biometric readers have not been rolled out on ATM's, cybercriminals have already developed tools to steal a person's fingerprint and other biological data.
The U.S. House of Representatives plans a vote on legislation that would task the SBA with assisting small businesses in improving preparedness against cyber threats.
A new analysis of Locky ransomware configurations by IT security firm Avira has revealed improved offline capabilities that enhance its ability to automatically encrypt victims' files, without interaction with a command-and-control server.
Australian and New Zealand businesses are being hit with a ransomware campaign.
Research from Blue Coat Systems shows how despite the increased use of social media, workers are still failing to fully protect themselves from complex social engineering techniques
"Multiple security issues" were patched for a number of VMware products.
Data theft knows no boundaries. Personal information has been siphoned out from databases connected to both presidential campaigns.
A survey recently conducted by Imperva showed that 36 percent of surveyed companies have experienced security incidents involving malicious employees in the past 12 months.
To better protect consumer data, banks and insurance companies in New York will soon be required to adhere to new cybersecurity guidelines.
A new Neutrino exploit kit invades a hack of a third-party ad server to deliver ransomware to adult website visitors.
The ransomware RAA, which incorporates the information-stealing trojan Pony, has evolved to more effectively target companies, encrypting victims' files and stealing their data, most likely to infect their business contacts via spear phishing.
The Department of Defense does not have the necessary visibility into the cyber capabilities of the National Guard, according to a report by the GAO.
An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.
An extra €70 million is to be spent in the five years from 2017 on a major refresh of cyber-capabilities.
The U.S. Army recently tested a drone capable of collecting enemy cyber information on the battlefield.
Bloggers using the WordPress platform are "strongly encouraged" to update their sites immediately to address persistent XSS issues.
Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.
A Trojan that infects Linux platforms to launch distributed denial of service (DDoS) attacks was discovered by MalwareMustDie.
The developers of the mobile banking trojan Gugi have introduced new modifications to sidestep two key security features of Android, reports Kaspersky Lab researcher Roman Unuchek via the Securelist blog.
An IBM researcher received a followup email from a person allegedly behind the creation of an Android malware app seeking redress to clarify some details.
A globalized malvertising campaign was targeting users in the U.S., Europe, Asia Pacific and the Middle East, infecting victims with ransomware before researchers at Cisco's Talos division helped shut down the operation .
A hacker, dubbing himself Mr. High, announced he had stolen the personal details of 6.5 million people across Idaho, Washington, Oregon and Kentucky.
Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.
The user data of 43,570,999 subscribers to the Last.fm music site were posted on the pwned repository LeakedSource.
Paypal users are being lured into clicking on a malicious link embedded in a tweet that appears to come from the financial transaction service.
A family of malware targeting Internet of Things (IoT) devices to create distributed denial of service (DDoS) botnets has been detected.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- RAUM weaponizes torrents to deliver malware
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void
- SWIFT adds additional protective measures for members to ensure cybersecurity compliance
- 185M incidents bypassed perimeter defenses - report
- Pagers found leaking patient health information
- OVH suffers massive 1.1Tbps DDoS attack