Latest Posts

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

E3fc80dfc564927d51a4d7320b45d6fa

Survey Shows Employers under Pressure to Keep Mobile Workers Safe

June 30, 2017 Added by:Vincent Geffray

According to a new report from Everbridge, 77% of employers said their employees would prioritize safety over privacy concerns when it comes to identifying their location during a critical event.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Lax IIoT Cybersecurity: the Perfect Breeding Environment for Industroyer

June 29, 2017 Added by:Jalal Bouhdada

In meeting the challenge posed by greater levels of threats and fewer cybersecurity specialists to meet them, a shift in focus is essential.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Don’t get lost in translation when managing mixed firewall estates

June 27, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks

Comments  (0)

81150be5971b06d836999bd9f01812f2

Make Sure We're Using the Same Language

June 27, 2017 Added by:Jay Kelley

Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Ztorg Trojan-SMS Infects Google Play Apps

June 24, 2017 Added by:Ionut Arghire

Newly discovered Google Play applications infected with the Ztorg Trojan family no longer request root privileges on compromised devices, Kaspersky Lab security researchers reveal.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – June 2017

June 15, 2017 Added by:Alexander Polyakov

In June 2017, SAP released 29 Security Notes, slightly more than the average number of 25 fixes per month released so far in 2017.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!

June 14, 2017 Added by:Mike Lennon

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

You Can't Hire Your Way Out Of The Skills Shortage... Period.

June 07, 2017 Added by:Nathan Burke

While there has been some optimism around the potential for closing the massive cybersecurity skills gap by training more people, training alone will not address the massive skills gap the country faces.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure

June 06, 2017 Added by:Alexandre Cagnoni

The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

June 02, 2017 Added by:Sean Tierney

On Friday, May 12, two separate ransomware attacks were unfolding, each both using different distribution capabilities and malware.

Comments  (0)

F21d07d4419b469fe0208b4a77f56c7b

Malware: The Gift That Keeps on Giving

June 02, 2017 Added by:Topher Tebow

Always be wary of unfamiliar USB devices, you never know what might be lurking in the darkness.

Comments  (0)

E54bce6ca0fef52e62d84b5ccedb4428

The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Adylkuzz: WannaCry’s Older and More Devious Cousin

May 25, 2017 Added by:Kevin Magee

You might be immune to infection by WannaCry because you've already been infected by Adylkuzz.

Comments  (0)

8259d904d48c0e93d3edf9383230de4c

Cloud Control: Key Points to Consider When Going to the Cloud

May 24, 2017 Added by:Luis Corrons

Establishing a solid plan when deciding to transition to the cloud is essential. By understanding the costs to store, transfer, and retrieve data, organizations can protect themselves from making a costly mistake.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

WannaCry Shows World the Need for Endpoint Security

May 24, 2017 Added by:Amir Geri

Ransomware attacks will continue to become more sophisticated and effective as the year goes on. It is now imperative that organizations prepare their networks and devices for a ransomware attack.

Comments  (0)

4d0ac884f6fdb0c44f281653697aa2cc

The Administrative Credentials Security Hole

May 24, 2017 Added by:Chris Stoneff

Here’s the problem: the existence of administrative credentials stored on machines throughout the network.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Live Webinar: Combining Pen Testing & Incident Detection

May 16, 2017 Added by:Mike Lennon

Join SecurityWeek and Rapid7's Eric Sun for actionable takeaways from penetration testing engagements, and see how customers are combining detection technologies to find intruders earlier in the attack chain.

Comments  (0)