C-Suite Divided Over Security Concerns

Read full post Survey shows 60% of CEOs plan to invest the most resources in malware prevention, but CISOs, CIOs, and CTOs are on a different page.

/ February 21, 2018

Getting Started with IoT Security in Healthcare

Read full post There’s a hazard that comes with introducing any new element into patient care whether it’s a new drug or a connected device. These four steps will help keep patients safe.

/ February 21, 2018

Is your child a victim of identity theft?

Read full post Finding out someone has already established your child’s credit for them is a nightmare to try and clean up after years of damage already done.

/ February 21, 2018

Flight simulator comes bundled with password stealing stowaway

Read full post How far should a company be able to go to protect its products from piracy?

/ February 21, 2018

Artificial intelligence reads privacy policies so you don’t have to

Read full post Researchers have created a deep learning tool that turns privacy policies into easy-to-read flowcharts

/ February 21, 2018

Read the 200,000 Russian Troll tweets Twitter deleted

Read full post NBC News asked three sources to retrieve the evidence of foreign election meddling that Twitter deleted

/ February 21, 2018

North Korean Reaper APT uses zero-day vulnerabilities to spy on governments

Read full post The often-overlooked hacking group appears to be backed by the North Korean government.

/ February 21, 2018

Phishing schemes net hackers millions of dollars from Fortune 500

Read full post IBM has uncovered sophisticated campaigns which are successfully targeting Fortune 500 companies.

/ February 21, 2018

Researcher to Release Free Attack Obfuscation Tool

Read full post Cybercrime gang FIN7, aka Carbanak, spotted hiding behind another Windows function, according to research to be presented at Black Hat Asia next month.

/ February 20, 2018

Facebook Aims to Make Security More Social

Read full post Facebook’s massive user base creates an opportunity to educate billions on security.

/ February 20, 2018

SWIFT Network Used in $2 Million Heist at Indian Bank

Read full post The theft at India’s City Union Bank comes on the heels of news that attackers stole $6 million from a Russian bank via SWIFT network last year.

/ February 20, 2018

Meltdown/Spectre: The First Large-Scale Example of a ‘Genetic’ Threat

Read full post These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority.

/ February 20, 2018

Cybercrime weighs most heavily on financial service firms

Read full post A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the...

/ February 20, 2018

Tesla cloud systems exploited by hackers to mine cryptocurrency

Read full post Researchers have discovered that Tesla’s AWS cloud systems were compromised for the purpose of cryptojacking.

/ February 20, 2018

Proactive Threat Hunting: Taking the Fight to the Enemy

Read full post Pulling together everything your security team needs to be effective at threat hunting is not easy but it’s definitely worthwhile. Here’s why.

/ February 20, 2018

Vulnerabilities Broke Records Yet Again in 2017

Read full post Meanwhile, organizations still struggle to manage remediation.

/ February 20, 2018

Facebook to verify election ad buyers by snail mail

Read full post The plan came a day after a federal indictment describing a Russian conspiracy to interfere in the 2016 election.

/ February 20, 2018

Apple fixes that “1 character to crash your Mac and iPhone” bug

Read full post Given the ease of copying and pasting the treacherous “crash character” into a message, Apple needed to get a patch out quickly.

/ February 20, 2018

Malvertising: Avoid Bad Ad Invasion

Read full post The way people shop has changed drastically over the last 10 years. E-commerce continues to boom. In fact, 80% of Americans made an online purchase in the past month, according to the Omni-Channel Retail Report from BigEcommerce....

/ February 20, 2018

Meet Coldroot, a nasty Mac trojan that went undetected for years

Read full post The malware can remotely steal passwords by logging everything a user types, and more.

/ February 20, 2018

Facebook told to stop tracking users that aren’t logged in

Read full post If Facebook doesn’t stop tracking users across the web, it could face a fine of €250,000 ($315,000) per day, says Belgian court.

/ February 20, 2018

Google drops new Edge zero-day as Microsoft misses 90-day deadline

Read full post Microsoft wasn’t able to come up with a patch within Google’s non-negotiable “you have 90 days” period, so the flaw is now public.

/ February 19, 2018

Millions bagged in two bank cyber-heists

Read full post This hack is said to be reminiscent of a particularly brazen bank cyber-heist from February 2016, in which hackers successfully pilfered $81 million from the account of the central bank of Bangladesh at the Federal Reserve Bank...

/ February 19, 2018

Broadband network plagued by wheezy old cryptomining gadget

Read full post The geriatric Bitcoin miner breathed out “spurious emissions” that befogged T Mobile’s broadband network in Brooklyn

/ February 19, 2018

Lawsuits threaten infosec research — just when we need it most

Read full post Security researchers and reporters have something in common: both hold the powerful accountable. But doing so has painted a target on their backs — and looming threats of legal action and lawsuits have many concerned.

/ February 19, 2018

US and UK condemn Russia for NotPetya

Read full post When it comes to pointing the finger for last year’s historically-disruptive NotPetya cyberattack, nobody could accuse the US and UK of dodging the issue.

/ February 19, 2018

Hackers sentenced for SQL injections that cost $300 million

Read full post It wasn’t *only* SQL injection, but it shows how far you can go if a company exposes its soft and fleshy parts to the internet.

/ February 19, 2018

Monday review – the hot 19 stories of the week

Read full post From the HTTPS countdown and the site forcing you to watch ads or it’ll start cryptomining to Facebook’s illegal privacy settings, and more!

/ February 19, 2018

13 Russians Indicted for Massive Operation to Sway US Election

Read full post Russian nationals reportedly used stolen American identities and infrastructure to influence the 2016 election outcome.

/ February 16, 2018

Telegram IM security flaw – what you see is NOT always what you get

Read full post Crooks revived an old visual trick to disguise files that would otherwise look dangerous right away.

/ February 16, 2018

Siemens Leads Launch of Global Cybersecurity Initiative

Read full post The new ‘Charter of Trust’ aims to make security a key element of the digital economy, critical infrastructure.

/ February 16, 2018

FedEx Customer Data Exposed on Unsecured S3 Server

Read full post Thousands of documents from US and international citizens were exposed on an Amazon S3 bucket configured for public access.

/ February 16, 2018

Rise of the ‘Hivenet’: Botnets That Think for Themselves

Read full post These intelligent botnet clusters swarm compromised devices to identify and assault different attack vectors all at once.

/ February 16, 2018

Google’s big plans for email will give them even more power

Read full post Google’s about to make your inbox a much more interesting place

/ February 16, 2018

Russian Hackers Sentenced in Heartland Payment Systems Breach Case

Read full post Two more men involved in the massive payment card theft from multiple major US corporations that began in 2007 now sent to federal prison.

/ February 16, 2018

US forms dedicated office to help avert cyberattacks at infrastructure

Read full post The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of...

/ February 16, 2018

Why Chrome’s ad filter isn’t an adblocker

Read full post Optimistic news coverage has described this as the arrival of adblocking in Chrome, it isn’t.

/ February 16, 2018

Facebook accused of spamming 2FA phone numbers

Read full post The social network is messaging users on their 2FA phone numbers and then posting their “PLEASE STOP!!” replies

/ February 16, 2018

Cyber News Rundown: Malware Attack Targets 2018 Winter Olympics

Read full post The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just...

/ February 16, 2018

Cybercrime Gang Ramps up Ransomware Campaign

Read full post In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.

/ February 15, 2018