Please turn on your JavaScript for this page to function normally.
danger
Turla gets ready to target Mac users

The cyber espionage group deploying the Turla (aka Snake, Uroburos, or Agent.BTZ) malware framework is expected to be able to target Mac users soon. The APT group The group, …

access
New infosec products of the week​: May 5, 2017

Inside threat detection and alerting from Code42 Code42 introducted Inside Threat Detection to its enterprise data protection and security platform. By generating proactive …

UK flag
UK govt wants real-time communication surveillance powers, courtesy of telcos

A leaked draft of proposed regulations shows that the UK government is after greater communication surveillance powers, and that in order to get them, it will legally require …

healthcare
Healthcare breaches: Is your data at rest or at risk?

In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …

defend
Three cybersecurity threat trends that organizations should address today

The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …

Users lock
Who’s responsible for secure Internet access?

Americans are divided on key issues around Internet access and responsibility for online privacy, according to AnchorFree. Over two thirds of Americans (68%) say Internet …

bot
Bondnet botnet goes after vulnerable Windows servers

A botnet consisting of some 2,000 compromised servers has been mining cryptocurrency for its master for several months now, “earning” him around $1,000 per day. …

GMV checker
Critical RCE flaw in ATM security software found

Researchers from Positive Technologies have unearthed a critical vulnerability (CVE-2017-6968) in Checker ATM Security by Spanish corporate group GMV Innovating Solutions. The …

WordPress
WordPress admins, take note: RCE and password reset vulnerabilities revealed

Independent security researcher Dawid Golunski has released a proof-of-concept exploit code for an unauthenticated remote code execution vulnerability in WordPress 4.6 …

authentication
Attackers exploited SS7 flaws to empty Germans’ bank accounts

Cyber criminals have started exploiting a long-known security vulnerabilities in the SS7 protocols to bypass German banks’ two-factor authentication and drain their …

World Password Day
World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

crowd
Making security everybody’s business goes beyond strong passwords

One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

Don't miss

Cybersecurity news