THN Weekly Roundup — 10 Most Important Stories You Should...
Here we are with our weekly roundup, briefing this week's top cyber security threats, incidents and challenges. This week has been very short with big news f...
BrandPost: Catching and Keeping Security Rock Stars
There’s no shortage of security products today that promise to detect malicious threats, but there is a shortage of qualified people who can administer them ...
Dark Web Users Suspect "Dream Market" Has Also Been Backd...
By now you might be aware of the took down of two of the largest online dark websites—AlphaBay and Hansa—in what's being called the largest-ever internationa...
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to ge...
Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.
Trickbot Malware Now Targets US Banks
Researchers with IBM and Flashpoint warn the Trickbot Trojan is growing more potent and now targeting U.S. banks.
BrandPost: Cyber Defense: What’s Next?
Increasingly sophisticated cyber-attacks are draining an estimated $450 billion annually from the global economy —a number that could reach $2 trillion by 20...
Motivation Mystery Behind WannaCry, ExPetr
A shift in APT tactics is emerging as characterized by the destructive ExPetr attacks hidden in ransomware, and WannaCry, which also failed to turn a profit.
Dark Reading News Desk Live at Black Hat USA 2017
Over 40 interviews streaming live right from Black Hat USA, July 26-27, from 2 p.m. - 7 p.m. Eastern Time (11 - 4 P.T.).
Speed of Windows 10 Adoption Not Affected by WannaCry
WannaCry has motivated security teams to stay current on patching but Windows 10 adoption remains the same.
20 Questions for Improving SMB Security
Security leaders in small and medium-sized business who want to up their game need to first identify where they are now, then, where they want to go.
Anticipating Black Hat: Hype and Reality
I’ve been looking forward to this year’s Black Hat event in Las Vegas for several months.  In my mind, Black Hat has become the industry’s premier event for ...
What to expect at Black Hat: Hype and reality
I’ve been looking forward to this year’s Black Hat event in Las Vegas for several months.  In my mind, Black Hat has become the industry’s premier event for ...
What to expect at Black Hat: Security hype and reality
I’ve been looking forward to this year’s Black Hat conference in Las Vegas for several months. In my mind, Black Hat has become the industry’s premier event ...
Oracle’s monster update emphasizes flaws in critical busi...
Recent global malware outbreaks WannaCry and NotPetya exposed how much enterprises struggle with patching. Staying current with the latest security patches i...
7 things your IT disaster recovery plan should cover
Hurricanes. Tornadoes. Earthquakes. Fires. Floods. Terrorist attacks. Cyberattacks. You know any of these could happen to your business at any time. And you’...
How Microsoft Cleverly Cracks Down On "Fancy Bear" Hackin...
What could be the best way to take over and disrupt cyber espionage campaigns? Hacking them back? Probably not. At least not when it's Microsoft, who is cont...
Using DevOps to Move Faster than Attackers
Black Hat USA talk will discuss the practicalities of adjusting appsec tooling and practices in the age of DevOps.
Russian National Receives 5 Years In Jail For Role In 'Ci...
Mark Vartanyan is the second individual to be sent to prison in connection with Citadel.
IDG Contributor Network: Is your cellphone number just as...
I’ve seen some recent news coverage touting that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers (SSN). As...
#HackTor: Tor Opens up its Bug Bounty Program
The popular identity-cloaking service has expanded its private, invite-only vulnerability discovery program to an open one via HackerOne.
Healthcare Industry Lacks Awareness of IoT threat, Survey...
Three-quarters of IT decision makers report they are "confident" or "very confident" that portable and connected medical devices are secure on their networks.
Healthcare Industry Lacks Awareness of IoT Threat, Survey...
Three-quarters of IT decision makers report they are "confident" or "very confident" that portable and connected medical devices are secure on their networks.
US Banks Targeted with Trickbot Trojan
Necurs botnet spreads Trickbot malware to US financial institutions, while new Emotet banking Trojan attacks discovered - signalling increasingly complex att...
Major Online Criminal Marketplaces AlphaBay and Hansa Shu...
International law enforcement operations result in AlphaBay, the largest online marketplace for selling illegal goods from malware to herion, and Hansa, goin...
Great big list of cybersecurity resources
Here's an excuse for IT workers to take some extra time off and head to the beach. Bring a smartphone and check out these cybersecurity lists. They're an eas...
Tor Launches Bug Bounty Program — Get Paid for Hacking!
With the growing number of cyber attacks and breaches, a significant number of companies and organisations have started Bug Bounty programs for encouraging h...
Exclusive: Dutch Cops on AlphaBay ‘Refugees’
Following today's breaking news about U.S. and international authorities taking down the competing Dark Web drug bazaars AlphaBay and Hansa Market, KrebsOnSe...
Apple Patches BroadPwn Bug in iOS 10.3.3
Apple released iOS 10.3.3 Wednesday that serves as a cumulative patch update for multiple vulnerabilities including the high-profile BroadPwn bug.
BrandPost: 3 Ways to Keep Your Data Private When You’re i...
Public Wi-Fi has made it easier than ever to be productive no matter where you are – at the airport, in a coffee shop and, in some communities, even just sit...
Feds Seize AlphaBay and Hansa Markets in Major Dark-Web Bust
It's finally confirmed — In a coordinated International operation, Europol along with FBI, DEA (Drug Enforcement Agency) and Dutch National Police have seize...
US, European Law Enforcement Shutter Massive AlphaBay Market
U.S. authorities along with law enforcement Europe and Asia announced today the takedown of the dark web’s largest illicit market, AlphaBay.
After AlphaBay’s Demise, Customers Flocked to Dark Market...
Earlier this month, news broke that authorities had seized the Dark Web marketplace AlphaBay, an online black market that peddled everything from heroin to s...
BrandPost: 7 tips to secure against IoT cyberthreats
For years, experts have warned about the danger of  Internet of Thing devices , often  built by companies on the cheap with little or no interest  in  buildi...
BEC Attacks Far More Lucrative than Ransomware over Past ...
BEC fraud netted cyberthieves five times more profit than ransomware over a three-year period, according to Cisco's midyear report released today.
Microsoft Office 365 Users Targeted in Brute Force Attacks
Attackers leveraged popular cloud service platforms to conduct persistent - and stealthy - login attempts on corporate Office 365 accounts.
DevOps & Security: Butting Heads for Years but Integratio...
A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.
DevOps & Security: Butting Heads for Years but Integratio...
A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.
IDG Contributor Network: Can Shakespeare solve our messag...
Getting the message The popular messaging app Telegram announced earlier this week it was stepping up its efforts to thwart terrorism communications after th...
IT Security News Blast 7-20-2017
CISO: To achieve security in IoT devices, remember the fundamentals When it comes to the internet of things, the landscape is different, but not necessarily ...
IDG Contributor Network: The thorny issue of verifying hu...
The old adage, by Peter Steiner of the New Yorker “on the Internet, nobody knows you’re a dog” has never been truer. As an organization, trying to build an i...
IDG Contributor Network: Know the 'real' price of vendor ...
The age of predatory vendors is upon us. Businesses that fail to take the old Latin adage caveat emptor (“let the buyer beware”) seriously do so to their ext...
Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.
How to DDoS Like an Ethical Hacker
You’ve just arrived home after a long work day, so long in fact that night has already set in. You wander a bit through the darkness, turn on the lights, gra...
Tor Project Opens Bounty Program To All Researchers
The Tor Project is launching a public bug bounty program to encourage security researchers to responsibly report issues they find in the software.
Critical Code Injection Flaw In Gnome File Manager Leaves...
A security researcher has discovered a code injection vulnerability in the thumbnail handler component of GNOME Files file manager that could allow hackers t...
How healthcare IT decision makers approach IoT security –...
More than 90% of healthcare IT networks have IoT devices connected to them. Over 70% of IT departments believe that the traditional security solutions used t...
Using Virtualization To Enhance Security, Save On Infrast...
Gone are the days when employees joined the organizations with lifetime commitment. There are competing priorities including family considerations, children’...
The dark web goes corporate
The "dark web" is a phrase strikes an ominous tone, conveying an impression of a marketplace where anything is for sale: hacking tools, weapons, drugs, child...
How to write an information security architect job descri...
Whatever the role, good communication regarding the duties and expectations of a security professional is key to that person’s success. That communication st...
Powered by Feed Informer