Please turn on your JavaScript for this page to function normally.
Cyber espionage topping the list of largest security concerns

20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …

magnify
The West African cybercriminal ecosystem is unlike any other

While there is still not an actual underground marketplace, cybercrime is pervasive in the West African region. Specifically, scamming operations. The peculiarities of the …

biohazard
Ransomware spiked 752% in new families

2016 was truly the year of online extortion. Cyber threats reached an all-time high, with ransomware and Business Email Compromise (BEC) scams gaining increased popularity …

lights
New infosec products of the week​: February 10, 2017

Capsule8: Container-aware, real-time threat protection for Linux Capsule8 emerged from stealth mode to unveil its plans for the industry’s first container-aware, …

research
New infosec products of the week​: January 13, 2017

Denim Group enhances ThreadFix platform Denim Group, a leading independent application security firm, today announced the latest version of ThreadFix, the company’s …

skull
New sheriffs in town: No More Ransom

A couple of months ago, Intel Security, Kaspersky Lab, Dutch National Police and Europol announced the No More Ransom initiative. Such an initiative was a true example of the …

danger
Next year, attacks will differentiate to penetrate new vulnerable surfaces

The upcoming year will include an increased breadth and depth of attacks, with malicious threat actors differentiating their tactics to capitalize on the changing technology …

sign
New infosec products of the week​: December 2, 2016

Trend Micro offers Deep Security as a Service on AWS Marketplace Trend Micro announced the availability of Trend Micro Deep Security as a Service on AWS Marketplace. This new …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

online gaming
Trade of online gaming currencies fuels cybercrime

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro …

Android malware
DressCode Android malware found in 3,000 apps

When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it …

Lock keyboard
HDDCryptor ransomware uses open source tools to thoroughly own systems

HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and …

Don't miss

Cybersecurity news