Threats

SEC commissioner urges info sharing, quick action at SINET summit

SEC commissioner urges info sharing, quick action at SINET summit

By

At a SINET Innovation Summit in New York, SEC Commissioner Luis Aguilar said the agency needs to do more and called for more formalized information sharing.

Bitcoin exchange compromised through SendGrid account

By

In an attack very similar to one last year, a SendGrid customer was compromised through its mail service account.

Blend of old and new techniques help attackers dodge detection, report says

Blend of old and new techniques help attackers dodge detection, report says

By

The 2015 Websense Threat Report found that threat actors are employing previously used C&C URLs to launch new threats.

Tsukuba trojan aimed at Japanese banking customers

Tsukuba trojan aimed at Japanese banking customers

By

The Tsukuba trojan like other proxy changers is not technically advanced but uses an interesting social engineering technique, researchers at IBM Trusteer found.

PlugX APT group uses backdoor in India campaign

By

A five-month-long campaign against organizations in India shows the group is active and evolving, SophosLab reports.

Disconnect yawns between CISOs, exec leadership, study says

Disconnect yawns between CISOs, exec leadership, study says

By

A recent survey by Ponemon Institute and Raytheon found senior executives don't fully understand the extent of security threats.

Gogo caught using fake Google SSL certificates

Gogo caught using fake Google SSL certificates

By

On a recent flight, a Google engineer discovered that SSL certificates were being signed by Gogo, not Google.

Spearfishing campaign compromises ICANN systems

By

Staff member credentials were used to access ICANN systems after spearphishing campaign that began in November.

Black market tactics mirror those of legit business

Black market tactics mirror those of legit business

By

A report from DellSecureWorks Counter Threat Unit revealed hacker training tutorials, replacement guarantees and a drop in RAT prices.

Iranian hackers targeting critical infrastructure

Iranian hackers targeting critical infrastructure

By

Researchers at Cylance have been monitoring a group out of Tehran, called Operation Cleaver, that it believes is gearing up for a massive attack on critical infrastructure.

First Stuxnet victims identified

By

Kaspersky Lab researchers are confident they have identified the first five victims, or patient zeroes, of the Stuxnet worm.

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House cyber guru says

By

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Study: Canada C-Suite execs say companies prepared for threats

By

A survey of Canadian business execs found that just over a quarter had experienced a cyber attack.

Best practices for removing admin rights: A step-by-step approach

Careful control of administrator rights in the very foundation of IT Security. Allowing admin rights exposes a dangerous security risk, creating an easy entry point for advanced persistent threats, zero-day attacks and sophisticated malware.

Top websites deliver CryptoWall ransomware via malvertising

By

The CryptoWall ransomware being delivered comes with a valid digital signature and initial VirusTotal results showed zero detections.

Insider threat cases on the rise, IC3 warns

By

Disgruntled and former employees have been increasingly engaging in computer network exploitation and disruption.

LogMeIn notifies users of fake emails claiming to be security update

By

Fake emails that appear to come from an authentic LogMeIn address state that the company has released a new security certificate.

More exploits, including Silverlight attack, packed in Nuclear kit

More exploits, including Silverlight attack, packed in Nuclear kit

By

Since the year's start, the number of exploits used by the kit has doubled, Trend Micro found.

Cyber thieves are ready for the holiday shopping season: are you?

Retail organizations have long been the target of financially-motivated crime. According to Verizon, 92% of the retail breaches they've studied were committed by external actors.

WordPress security simplified — Six easy steps for a more secure website

WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation.

How to use crowd-sourced threat intelligence to stop malware in its tracks

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry.

Researcher challenges reports that BlackPOS variant struck Home Depot

By

Nuix believes the malware found on Home Depot's systems belongs to a different threat family.

Tapping global threat intelligence to secure enterprise networks

On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector

Researchers reveal security issues in Android apps

By

On Monday, the University of New Haven revealed its first video in a series of security findings.

Salesforce warns of Dyre malware possibly targeting users

Salesforce warns of Dyre malware possibly targeting users

By

Salesforce posted a notification that its users are possibly being targeted by Dyre malware and offered some recommendations to avoid the threat.

Phishing continues to be effective, McAfee Labs report shows

Phishing continues to be effective, McAfee Labs report shows

By

Out of 16,000 business users who took the McAfee Phishing Quiz, 80 percent fell for at least one of seven phishing emails.

APT group adapts Windows backdoor to target Mac computers

APT group adapts Windows backdoor to target Mac computers

By

The backdoor, called "XSLCmd," was detected in earlier attacks on Windows systems, FireEye found.

iCloud beefs up security in wake of celebrity nude photo scandal

By

Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.

Namecheap.com reveals attack on login systems

By

Late last month a group of attackers targeted the web hosting company's login portal to try and access users' accounts.

Researchers discover two SQL injection flaws in WordPress security plugin

By

High-Tech Bridge discovered two SQL injection vulnerabilities in All In One WordPress Security and Firewall plugin and notified the vendor.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US