
Whitepaper: Top 20 cyber attacks on ICS
This whitepaper is no longer available. The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. …

US man is behind the 2015 Hacking Team hack?
Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the …

eBook: Defending against crypto-ransomware
This promotion has ended. According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is …

Enterprise USB security is outdated and inadequate
While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …

1.4 billion unencrypted credentials found in interactive database on the dark web
A data dump containing over 1.4 billion email addresses and clear text credentials is offered for download in an underground community forum. What’s so special about …

An analysis of 120 mobile app stores uncovers plethora of malicious apps
RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …

Return of Necurs botnet brings new ransomware threat
The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check …

MoneyTaker’s stealthy hacking spree spread from US to Russia
A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation …

Keylogger found in Synaptics driver on HP laptops
For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss …

Worldwide server revenue grew 16% in Q3 2017
In the third quarter of 2017, worldwide server revenue increased 16 percent year over year, while shipments grew 5.1 percent from the second quarter of 2016, according to …

Android vulnerability allows attackers to modify apps without affecting their signatures
Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The danger …

Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS
Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility