Please turn on your JavaScript for this page to function normally.
DDoS
Here we go again: DDoS attacks on the rise!

Newly released data shows that DDoS and web application attacks are on the rise once again, according to Akamai’s Second Quarter, 2017 State of the Internet / Security …

robot IOActive
Hacked robots can be a deadly insider threat

IOActive researchers have probed the security of a number of humanoid home and business robots as well industrial collaborative robots, and have found it seriously wanting. A …

cybercrime
Hackers stole over $500,000 from Enigma cryptocurrency investors

Unknown hackers have managed to steal over $500,000 from aspiring investors in the Enigma cryptocurrency investment platform. The Enigma cryptocurrency hack The attack …

businessman
Learning from success: Brian Honan’s infosec journey

When Brian Honan started his information security consultancy thirteen years ago, most of his conversations were with those in charge of IT and/or IT security within an …

locks
Disturbing lack of cyber attack awareness among directors

Britain’s top firms and charities urgently need to do more to protect themselves from online threats, according to new government research and a ‘cyber health check’. One in …

NetworkMiner
Network forensics tool NetworkMiner 2.2 released

NetworkMiner is a popular network forensics tool that can parse pcap files as well as perform live sniffing of network traffic. It collects data about hosts on the network …

smartphone tools
Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from …

Bitcoin
Third party trackers on web shops can identify users behind Bitcoin transactions

More and more shopping Web sites accept cryptocurrencies as a method of payment, but users should be aware that these transactions can be used to deanonymize them – even …

Qualys
Why you need to implement security controls across your environment

In this podcast recorded at Black Hat USA 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses the importance of security configuration …

architecture
Doing things right: Cloud and SecOps adoption

There is hardly an organization out there that isn’t planning or hasn’t already taken advantage of the cloud. And, according to Threat Stack CTO Sam Bisbee, there is hardly a …

Sqrrl
Sqrrl empowers threat hunters with self-service analytics

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package …

Week in review: WordPress ransomware, NotPetya aftermath

Here’s an overview of some of last week’s most interesting news and articles: EV ransomware is targeting WordPress sites WordPress security outfit Wordfence has …

Don't miss

Cybersecurity news