Latest Blog Posts


Privacy Concerns Changing the Playing Field for Brands

June 24, 2015 Added by:Peter Zavlaris

New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.

Comments  (0)


Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)


Trouble In The Cloud?!

June 23, 2015 Added by:Anton Chuvakin

What challenges does the usage of traditional, on-premise security tools [monitoring tools, like SIEM or DLP, in particular] creates in the cloud [SaaS, PaaS, IaaS models]?

Comments  (0)


We Need a New FUD

June 23, 2015 Added by:Dave Shackleford

I’m willing to argue that “breach weariness” is most certainly never going to be the catalyst for increased investment in security, and really bad/big breaches likely won’t either.

Comments  (0)


SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)


Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)


'Lotus Blossom' Cyber-espionage Campaign Stretches Back 3 Years: Palo Alto Networks

June 22, 2015 Added by:Brian Prince

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

Comments  (0)


7 Development AppSec Tricks to Keep the Hackers Away – Part 2

June 22, 2015 Added by:Tripwire Inc

Application security starts from the foundation – the source code.

Comments  (0)


Hackers Targeted the Polish Airline LOT, Grounded 1,400 Passengers

June 22, 2015 Added by:Pierluigi Paganini

The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport.

Comments  (0)


SAP Encryption Issues Pose Serious Risk to Organizations: Researchers

June 18, 2015 Added by:Eduard Kovacs

The use of static keys and other encryption issues expose numerous organizations that rely on SAP products to malicious hacker attacks, researchers have warned.

Comments  (0)


“For me? You shouldn’t have. No, really…”

June 18, 2015 Added by:Malwarebytes

More often than not, the sad truth is that if you’re worrying after the creation stage, you’ve probably left it too late and those juicy secrets are going to escape. Deploying a healthy dose of caution before setting digital pen to paper is always going to pay off.

Comments  (0)


DDoS Attacks Cost Victims Average of $40,000 per Hour

June 18, 2015 Added by:Anthony M. Freed

The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.

Comments  (0)


7 Development AppSec Tricks to Keep the Hackers Away – Part 1

June 17, 2015 Added by:Tripwire Inc

The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.

Comments  (0)


Once More on Cloud SIEM or SaaS SIEM

June 17, 2015 Added by:Anton Chuvakin

A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.

Comments  (0)


The Need to Address the Cyber Security of Field Controllers and Sensors (Level 1 Devices)

June 17, 2015 Added by:Joe Weiss

The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.

Comments  (0)


China Uses Watering Hole Attacks, JSONP Hijacking to Identify Users

June 16, 2015 Added by:Eduard Kovacs

Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.

Comments  (0)

« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »