Latest Blog Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2016

August 11, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for August 2016. This patch update closes 30 vulnerabilities in SAP products including 26 SAP Security Patch Day Notes and 4 Support Package Notes.

Comments  (0)

D8cfa4fbaaebcf97800b91c2c7dedd5d

Getting Your Records GDPR-Ready

August 11, 2016 Added by:Gavin Siggers

The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.

Comments  (0)

Bff69da3ab11dd09027195fd431c4b09

Exploit Kits: Infiltrating the Ad Industry with Traditional Tactics

August 11, 2016 Added by:Karl Sigler

Exploit kits are increasingly using the evil twin of an advertisement, a malvertisement, as a gateway to a web browser.

Comments  (0)

Ad62dd51cf8a9e3d667bcdd92d493ccc

One Encryption Backdoor Is One Too Many

August 11, 2016 Added by:Joe Levy

Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Vawtrak Banking Trojan Gets Improved Persistence

August 09, 2016 Added by:Ionut Arghire

The operators of Vawtrak, a banking Trojan that has been around for a few years, have recently improved the malware’s persistence mechanism, PhishLabs researchers warn.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

FossHub Hacked, Distributes Malware-Packed Audacity and Classic Shell

August 05, 2016 Added by:Ionut Arghire

Hackers managed to compromise FossHub and replace app installers distributed through it with malware-packed files, but not before hundreds of users downloaded the infected executables.

Comments  (0)

D48cea157203015572756b2608f4c51f

Navigating the Complexities of Secure Third-Party Access

August 03, 2016 Added by:Mark Carrizosa

Three industry influencers identify trends and priorities and discuss what they are doing within their own organizations to mitigate third-party risk.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

PayPal Fixes CSRF Bug in PayPal.me Website

August 01, 2016 Added by:Ionut Arghire

PayPal recently resolved a cross-site request forgery (CSRF) vulnerability affecting the PayPal.me website, which could have allowed an attacker to change a user’s PayPal profile picture.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Brexit Means for Global Security Professionals

July 27, 2016 Added by:Dan Lohrmann

The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.

Comments  (0)

Cd4a401af99bbf084db76ad6044a5639

Don’t Be a Victim – Fight Ransomware Attacks with These Proven Steps

July 27, 2016 Added by:Slawek Ligier

There is certainly no shortage of cyber-attacks in the headlines, and none more prevalent than ransomware attacks. These bold attacks encrypt user files, then demand a ransom in exchange for decrypting the files and restoring access to the original owner.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Palo Alto Networks Webinar: Five Steps to a Secure Hybrid Architecture

July 25, 2016 Added by:InfosecIsland News

SecurityWeek and Palo Alto Networks will host a live network security webinar on Wednesday, July 27th at 1:00PM ET: Five Steps to a Secure Hybrid Architecture.

Comments  (0)

8e45a76b01e10a6a710858234986963e

Black Hat, DEFCON and the Summer of Our Discontent

July 21, 2016 Added by:Paul Shomo

I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Tor Veteran Leaves, Shuts Down Core Node

July 19, 2016 Added by:Ionut Arghire

Lucky Green, one of the people who has been with the Tor project for years before it was even called Tor, is leaving the project and has already announced plans to shut down a core node in the process.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »