How to protect the power grid from low-budget cyberattacks
Cyberattacks against power grids and other critical infrastructure systems have long been considered a threat limited to nation-states due to the sophistication and resources …
Threat prevention for protecting production environments
Capsule8 launched the beta version of Capsule8 Protect, a threat prevention and response platform purpose-built for cloud-native environments. Organizations are rapidly …
Phishers’ techniques and behaviours, and what to do if you’ve been phished
Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …
Photo gallery: Black Hat USA 2017, part 2
Black Hat USA 2017 is underway at Las Vegas, and here are a few photos from the Business Hall, the Arsenal, and the Innovation City. Featured companies: NTT Security, …
Security vulnerabilities in radiation monitoring devices
IOActive researcher Ruben Santamarta has uncovered a number of cybersecurity vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs), and has presented his …
22% of SMBs hit by ransomware had to cease business operations
More than one-third of small and medium-sized businesses have experienced a ransomware attack in the last year, a new Malwarebytes report claims, and 22 percent of these …
Russian arrested, indicted for laundering funds from Mt. Gox hack
Alexander Vinnik, a Russian man arrested on Tuesday in Greece, is allegedly the operator of digital currency exchange BTC-e, through which funds from the Mt. Gox bitcoin …
Lippizan: Sophisticated, targeted spyware on Google Play
Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed …
An Internet-connected fish tank let hackers into a casino’s network
A high-tech, internet-connected fish tank in a North American casino has been used to exfiltrate data from the company’s network. Smart drawing pads used in an …
Most companies fail to measure cybersecurity effectiveness
Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …
Employees working while on holiday open orgs to security risks
Many workers will feel the need to check-up on work emails while they are away from the office and enjoying a well-earned vacation. Unfortunately, by doing that, they can open …
Self-service perimeter security for the hybrid cloud
Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken