Please turn on your JavaScript for this page to function normally.
WordPress
20,000-bots-strong Sathurbot botnet grows by compromising WordPress sites

A 20,000-bots-strong botnet is probing WordPress sites, trying to compromise them and spread a backdoor downloader Trojan called Sathurbot as far and as wide as possible. …

abstract
Threat intelligence sharing challenges: Understand the context of cyber events

A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …

strategy
Oil and gas companies’ cybersecurity strategies are evolving

Lacking enterprise-wide cyber analytics technology to monitor for cyberattacks, most oil and gas companies are not fully aware of when or even how cyberattacks might affect …

Keyboard
New infosec products of the week​: April 7, 2017

A rules engine that adapts to changing attack patterns DataVisor announced the latest addition to its full stack analytics platform, the DataVisor Automated Rules Engine, a …

Hybrid infrastructure services
Extensive shift to hybrid infrastructure services is underway

The growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO) indicate a massive shift toward hybrid infrastructure services, …

How attackers exploit whitelists

If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …

Windows
Windows 10 Creators Update will come with clearer privacy options

Nearly two years after Microsoft released Windows 10, the company has finally revealed what data it collects from users. The revelation comes as part of a recent change of the …

iCloud
“iCloud Mail” phishing emails doing rounds

The latest email phishing campaign targeting Apple users is aimed at gathering as much information as possible from unfortunate victims. The email, made to look like it comes …

bot
Video: TinyNuke botnet explained

In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

numbers
23% of security pros are blind to encrypted traffic threats

According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …

Generational differences increase security risks

There are two major IT security risks that enterprises need to prepare for – Millennials and the impending General Data Protection Regulation (GDPR). A global Ponemon …

alert
Most organizations were victims of business email compromise in 2016

Nearly three quarters of corporate treasury and finance professionals said their companies were victims of payments fraud last year, according to the Association for Financial …

Don't miss

Cybersecurity news