Latest Posts
Researchers Detail Linux-Based “Chaos” Backdoor
February 20, 2018 Added by:Ionut Arghire
A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.
Comments (0)
Large Crypto-Mining Operation Targeting Jenkins CI Servers
February 20, 2018 Added by:Ionut Arghire
A large malicious crypto-mining operation has recently started targeting the powerful Jenkins CI server, Check Point security researchers have discovered.
Comments (0)
Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics
February 16, 2018 Added by:Ben Carr
Start planning now for the events on the horizon; hopefully you thought ahead for Pyeongchang – but remember Tokyo 2020 isn’t that far way.
Comments (0)
SAP Cyber Threat Intelligence Report – February 2018
February 16, 2018 Added by:Alexander Polyakov
The second set of SAP Security Notes in 2018 consists of 26 patches with the majority of them rated medium.
Comments (0)
The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking
February 09, 2018 Added by:Ross Rustici
Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.
Comments (0)
Think GDPR Won’t Affect Your U.S. Company? Guess Again
February 07, 2018 Added by:Ken Spinner
Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.
Comments (0)
Advancing the Usability of PKIs
February 06, 2018 Added by:Dan Timpson
If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.
Comments (0)
The Five Secrets to Making Security Awareness Work in 2018
January 29, 2018 Added by:Perry Carpenter
Are you ready to make 2018 a break-out year for your security awareness program?
Comments (0)
Crypto-Mining Is the Next Ransomware
January 19, 2018 Added by:Steve McGregory
Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.
Comments (0)
Increasing Importance of Mobile Makes Malware a Priority
January 17, 2018 Added by:Asma Zubair
Businesses should fortify their high value apps with additional security precautions from the inside out.
Comments (0)
What Global Manufacturers Need to Know About Security in the Cloud
January 08, 2018 Added by:Srivats Ramaswami
Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.
Comments (0)
Security in Operational Technology: Five Top Trends in 2018
January 05, 2018 Added by:Jalal Bouhdada
Top five security trends to watch for in 2018
Comments (0)
Bitcoin in the Darknet Ecosystem
January 05, 2018 Added by:Guy Caspi
Bitcoin is a rollercoaster for both investors and cybercriminals
Comments (0)
The 5 Motives of Ransomware
January 04, 2018 Added by:Joseph Carson
Who would have foreseen the impact of both WannaCry and NotPetya
Comments (0)
Fake Android Security Tools Harvest User Data
January 04, 2018 Added by:Ionut Arghire
Tens of Android applications masquerading as security tools were found bombarding users with ads, tracking their location, and secretly harvesting user data, Trend Micro reports.
Comments (0)
Hackers Wreak Havoc in 2017, is 2018 Ready to Battle?
January 04, 2018 Added by:Martin McKeay
If 2017 taught us anything, it’s that we have a long way to go to get ahead of adversaries. The biggest impact a security team can make in the new year is to understand how effectiveness of their protections are against the evolving threats.
Comments (0)
Global Security Threats You Need to Know About in 2018
January 03, 2018 Added by:Steve Durbin
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Comments (0)
The IT Security Lessons from 2017
December 22, 2017 Added by:Avishai Wool
A look at the IT security lessons that can be learned from 2017
Comments (0)
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
December 22, 2017 Added by:Sanjay Kalra
Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.
Comments (0)
Google Patches High Risk Flaw in Chrome 63
December 18, 2017 Added by:Ionut Arghire
Google has released Chrome 63.0.3239.108 to the stable channel to address two security vulnerabilities in the browser.