Blink Health appoints Kurt Sauer as CISO
Blink Health announces the appointment of Kurt Sauer as CISO. Sauer, who most recently served as Vice President of Trust & Information Security at Salesf...
Bandura announces $4 million in Series A funding
Bandura announced it has completed a Series A round, securing $4 million in financing led by Grotech Ventures, Gula Tech Adventures, Maryland Venture Fund, a...
ETSI releases cryptographic standards for secure access c...
ETSI Technical Committee on Cybersecurity has recently released two specifications on Attribute-Based Encryption (ABE) that describe how to protect personal ...
How Threats Increase in Internet Time
Cybercrime incidents and costs increase with each passing minute on the Internet.
Microsoft Sinkholes 6 Fancy Bear/APT28 Internet Domains
Operation appears to have disrupted early stages of an attack campaign using spoofed nonprofit, Senate, and Microsoft domains.
Ryuk Ransomware Emerges in Highly Targeted, Highly Lucrat...
The highly sophisticated operation shares code with the Hermes malware, and may be linked to the Lazarus Group APT actor.
Dark Tequila: A Distilled Threat for Mexican Targets
Dark Tequila, which has been active since 2013, is highly modular and targets victims in Mexico.
Airmail 3 Exploit Instantly Steals Info from Apple Users
Attackers can abuse URL requests processed by an email program for Mac to steal files from the victim -- sometimes without user interaction.
How often are users’ DNS queries intercepted?
A group of Chinese researchers wanted to find out just how widespread DNS interception is and has presented the result of their large-scale study to the audi...
IDG Contributor Network: Why burnout happens in Informati...
What are the signs that lead to employee burnout in Information Security? I’ve been a CISO for 10 years. I’ve worked in Information Security for 15. I’ve wor...
YL Ventures expands advisory board with 24 cybersecurity ...
YL Ventures, the Silicon Valley headquartered seed-stage venture capital firm focusing on Israeli cybersecurity innovation, announced a major expansion of it...
How to Gauge the Effectiveness of Security Awareness Prog...
If you spend $10,000 on an awareness program and expect it to completely stop tens of millions of dollars in losses, you are a fool. If $10,000 prevents $100...
Clinging to TLS 1.0 Puts Sites Outside PCI DSS Compliance
More than half of organizations could be out of compliance, new research shows.
Open-Source Hybrid Analysis Portal Gets a Boost
CrowdStrike donates its accelerated search engine to the free malware analysis site.
Belkin IoT Smart Plug Flaw Allows Remote Code Execution i...
An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network.
Retail and finance top the list of vulnerable industries,...
The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturi...
Latin America Served with 'Dark Tequila' Banking Malware
The complex operation packs a multistage payload and spreads via spear-phishing emails and infected USB devices.
Dark Tequila Banking Malware Uncovered After 5 Years of A...
Security researchers at Kaspersky Labs have uncovered a new, complex malware campaign that has been targeting customers of several Mexican banking institutio...
IDG Contributor Network: 5 tips for future-proofing your ...
Today’s enterprises are under pressure to keep pace with digital transformation initiatives to fend off the increasing number of businesses vying for market ...
What Are Small Organizations Doing About Cybersecurity?
Last week, I published a blog on the state of cybersecurity at small organizations.  As a review, two-thirds of firms with 50 to 499 employees have experienc...
Wickr Adds New Censorship Circumvention Feature to its En...
Open Secure Access addresses void created by Google, Amazon decision to disallow domain fronting, company says.
Russian Hacking Groups Targeting U.S. Political System, C...
​​Russian hacking groups are renewing their efforts towards the U.S. political system, climate change could have major ramifications for river flooding, inma...
Meet Intrusion Truth, The Mysterious Group Doxing Chinese...
Microsoft Claims Win Over Russian Political Hackers
Google Sued For Tracking You, Even When Location History ...
Connected Car Data Handover Headache - There's No Quick Fix
Proving ROI: How a Security Road Map Can Sway the C-Suite
When executives are constantly trying to cut the fat, CISOs need to develop a flexible structure to improve baseline assessments and target goals, tactics, a...
Microsoft disrupted Russian hacking campaign aimed at US ...
Microsoft shut down six websites created by the Russian government-linked hacking group Fancy Bear which were meant to disrupt democracy ahead of the 2018 mi...
Hackers Leverage AWS to Breach, Persist in Corporate Netw...
Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.
Hackers Leverage AWS To Breach, Persist In Corporate Netw...
Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.
Video: Bishop Fox on Device Threats and Layered Security
Bishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.
Google Faces Legal Turmoil After Location Tracking Debacle
After a report said Google tracks users even when they opt out, the company is under fire from activists and has been slapped with a lawsuit.
Researchers convert QR codes into complex 3D features to ...
The worldwide market for 3D-printed parts is a $5 billion business with a global supply chain involving the internet, email, and the cloud – creating a numbe...
7 Serious IoT Vulnerabilities
A growing number of employees have various IoT devices in their homes - where they also could be connecting to an enterprise network to do their work. And th...
BrandPost: The Cybersecurity Regulations Healthcare, Fina...
Cyberattacks are often motivated by the desire to steal and sell sensitive data, such as credit card and financial records, personally identifiable informati...
Guns are already on UK streets. 3D printing could make th...
Opinion: With 3D gun blueprints now available for download, it's potentially too late to stop the future impact on the streets of London.
How to develop the right strategy to increase IoT security
As more and more devices become connected, many industries that were previously secure are experiencing new threats or attacks to their devices and services....
Let user experience guide your security requirements
If you’re like most business leaders, you try to do everything you can to keep your company’s information safe. You tell your employees to use strong passwor...
Smart irrigation systems vulnerable to attacks, warn rese...
Internet-connected irrigation systems suffer from security gaps that could be exploited by attackers aiming, for example, to deplete a city’s water reserves,...
SUSE and Microsoft collaborate to deliver enterprise Linu...
SUSE announced the availability of the enterprise Linux kernel tailored for Microsoft Azure. SUSE Linux Enterprise Server 15 on-demand instances now run on a...
CloudPassage debuts Halo Cloud Secure, delivering securit...
CloudPassage announced the general availability of Halo Cloud Secure, which offers protection of public cloud infrastructure, delivering security and DevOps ...
"Two Stage" BMW Theft Attempt
Modern cars have alarm systems that automatically connect to a remote call center. This makes cars harder to steal, since tripping the alarm causes a quick r...
Google Sued Over Misleading Users About Location Tracking...
Google was in the news last week for a misleading claim that "with Location History off, the places you go are no longer stored," which is not true. Now, the...
McAfee: Calling Bitfi unhackable may have been 'unwise' b...
The "unhackable" wallet saga may have been little more than salesmanship designed to provoke controversy.
Say Goodbye to Passwords, the Future of Authentication is...
It has been clear for a while now that passwords no longer provide the user experience or security needed for consumers today. Take the fact that a few month...
Dark Tequila Añejo
Dark Tequila is a complex malicious campaign targeting Mexican users, with the primary purpose of stealing financial information, as well as login credential...
Arista Networks PICs its spot In security
Over the past few years, arguably no vendor has been more disruptive in the networking industry than Arista Networks. The company has an excellent track reco...
Why SMS banking is still a bad idea
Bank with Capital One and you can have account information sent to you by text. In March 2017, the bank started piloting Eno, an SMS-based chatbot customers ...
What are Amazon Zelkova and Tiros? AWS looks to reduce S3...
To help reduce the chance of AWS S3 configuration errors, Amazon is working on two new tools –  Zelkova and Tiros – to provide greater clarity around who has...
What most companies forget when fighting off cyberattacks
Never underestimate the ingenuity and effort that burglars will put into their work. If a team of committed criminals knows that there are untold of riches l...
Powered by Feed Informer