
Fileless worm builds cryptomining, backdoor-planting P2P botnet
A fileless worm dubbed FritzFrog has been found roping Linux-based devices – corporate servers, routers and IoT devices – with SSH servers into a P2P botnet whose …

Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter
Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …

Five ways to maximize FIDO
Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …

The benefits of providing employees with an identity compromise solution
Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …

Telehealth is the future of healthcare, but how secure is it?
54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …

Large-scale migrations away from on-premise environments are underway
COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …

Computer scientists create benchmarks to advance quantum computer performance
Two UCLA computer scientists have shown that existing compilers, which tell quantum computers how to use their circuits to execute quantum programs, inhibit the …

Updated cryptojacking worm steals AWS credentials
A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …

Chrome 86 will prominently warn about insecure forms on secure pages
Entering information into and submitting it through insecure online forms will come with very explicit warnings in the upcoming Chrome 86, Google has announced. The new alerts …

How do I select a risk assessment solution for my business?
One of the cornerstones of a security leader’s job is to successfully evaluate risk. A risk assessment is a thorough look at everything that can impact the security of …

Why do healthcare organizations have a target on their back?
Medical records command a high value on the dark web due to the large amount of personal information they hold. Cybercriminals can sell stolen healthcare data for a massive …

Terrascan open source software helps developers build secure cloud infrastructure
Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code (IaC). The new release …