Cyber extortionists are hitting hedge funds
Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund …
Man charged with attempted spear-phishing attack on U.S. Department of Energy
An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …
Why WinSCP became an open source classic
If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …
Increasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …
Angler EK pushes unnamed ransomware
“Malware distribution campaigns based using the popular Angler exploit kit continue delivering different types of ransomware. Last week, it was AlphaCrypt, which …
Tor Cloud project reaches the end of the line
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …
Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
Data privacy endangered by international trade agreements
You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …
Breaking Bad-themed ransomware targeting users
“A new type of ransomware is targeting Australian users, and its creators have decided to have some fun and express their love for the popular US TV show Breaking Bad …
Court declares NSA’s domestic phone metadata collection program illegal
It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring