Security professionals are most concerned about the endpoint, citing it as the greatest source of risk in a Bromium survey of more than 100 pros who attended Black Hat USA 2015 in Las Vegas last week.
Researchers at Malwarebytes uncovered a malvertising campaign against AdSpirit.de, similar to the one used recently on Yahoo.
Attackers have been observed substituting Cisco's IOS bootstrap with a malicious ROMMON image after first accessing the company's IOS devices.
At a SINET Innovation Summit in New York, SEC Commissioner Luis Aguilar said the agency needs to do more and called for more formalized information sharing.
In an attack very similar to one last year, a SendGrid customer was compromised through its mail service account.
The 2015 Websense Threat Report found that threat actors are employing previously used C&C URLs to launch new threats.
The Tsukuba trojan like other proxy changers is not technically advanced but uses an interesting social engineering technique, researchers at IBM Trusteer found.
A five-month-long campaign against organizations in India shows the group is active and evolving, SophosLab reports.
A recent survey by Ponemon Institute and Raytheon found senior executives don't fully understand the extent of security threats.
On a recent flight, a Google engineer discovered that SSL certificates were being signed by Gogo, not Google.
Staff member credentials were used to access ICANN systems after spearphishing campaign that began in November.
A report from DellSecureWorks Counter Threat Unit revealed hacker training tutorials, replacement guarantees and a drop in RAT prices.
Researchers at Cylance have been monitoring a group out of Tehran, called Operation Cleaver, that it believes is gearing up for a massive attack on critical infrastructure.
Kaspersky Lab researchers are confident they have identified the first five victims, or patient zeroes, of the Stuxnet worm.
The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.
A survey of Canadian business execs found that just over a quarter had experienced a cyber attack.
Careful control of administrator rights in the very foundation of IT Security. Allowing admin rights exposes a dangerous security risk, creating an easy entry point for advanced persistent threats, zero-day attacks and sophisticated malware.
The CryptoWall ransomware being delivered comes with a valid digital signature and initial VirusTotal results showed zero detections.
Disgruntled and former employees have been increasingly engaging in computer network exploitation and disruption.
Fake emails that appear to come from an authentic LogMeIn address state that the company has released a new security certificate.
Since the year's start, the number of exploits used by the kit has doubled, Trend Micro found.
Retail organizations have long been the target of financially-motivated crime. According to Verizon, 92% of the retail breaches they've studied were committed by external actors.
WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation.
Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry.
Nuix believes the malware found on Home Depot's systems belongs to a different threat family.
On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector
On Monday, the University of New Haven revealed its first video in a series of security findings.
Salesforce posted a notification that its users are possibly being targeted by Dyre malware and offered some recommendations to avoid the threat.
Out of 16,000 business users who took the McAfee Phishing Quiz, 80 percent fell for at least one of seven phishing emails.
The backdoor, called "XSLCmd," was detected in earlier attacks on Windows systems, FireEye found.
Sign up to our newsletters
SC Magazine Articles
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Report: Phishing costs average organization $3.7 million per year