Latest Posts

Fa42af438e58b799189dd26386f5870f

Researchers Detail Linux-Based “Chaos” Backdoor

February 20, 2018 Added by:Ionut Arghire

A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Large Crypto-Mining Operation Targeting Jenkins CI Servers

February 20, 2018 Added by:Ionut Arghire

A large malicious crypto-mining operation has recently started targeting the powerful Jenkins CI server, Check Point security researchers have discovered.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics

February 16, 2018 Added by:Ben Carr

Start planning now for the events on the horizon; hopefully you thought ahead for Pyeongchang – but remember Tokyo 2020 isn’t that far way.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – February 2018

February 16, 2018 Added by:Alexander Polyakov

The second set of SAP Security Notes in 2018 consists of 26 patches with the majority of them rated medium.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

377a54ee089b6809e8e68d75d28614cb

Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

The Five Secrets to Making Security Awareness Work in 2018

January 29, 2018 Added by:Perry Carpenter

Are you ready to make 2018 a break-out year for your security awareness program?

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Crypto-Mining Is the Next Ransomware

January 19, 2018 Added by:Steve McGregory

Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

86e0caefdf114afad6827dea09ba79c6

What Global Manufacturers Need to Know About Security in the Cloud

January 08, 2018 Added by:Srivats Ramaswami

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Security in Operational Technology: Five Top Trends in 2018

January 05, 2018 Added by:Jalal Bouhdada

Top five security trends to watch for in 2018

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Bitcoin in the Darknet Ecosystem

January 05, 2018 Added by:Guy Caspi

Bitcoin is a rollercoaster for both investors and cybercriminals

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Fake Android Security Tools Harvest User Data

January 04, 2018 Added by:Ionut Arghire

Tens of Android applications masquerading as security tools were found bombarding users with ads, tracking their location, and secretly harvesting user data, Trend Micro reports.

Comments  (0)

2b8841bdc3ceab2b637f4594ef21d2aa

Hackers Wreak Havoc in 2017, is 2018 Ready to Battle?

January 04, 2018 Added by:Martin McKeay

If 2017 taught us anything, it’s that we have a long way to go to get ahead of adversaries. The biggest impact a security team can make in the new year is to understand how effectiveness of their protections are against the evolving threats.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats You Need to Know About in 2018

January 03, 2018 Added by:Steve Durbin

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Google Patches High Risk Flaw in Chrome 63

December 18, 2017 Added by:Ionut Arghire

Google has released Chrome 63.0.3239.108 to the stable channel to address two security vulnerabilities in the browser.

Comments  (0)