China-based “Threat Group 3390” Gets Selective in Data Exfiltration
Hi, what are you looking for?
China-based “Threat Group 3390” Gets Selective in Data Exfiltration
As more organizations become more comfortable with putting data in the cloud, they are aggressively applying varying levels of data protection to different types...
Even after a year of debilitating data breaches and an increased focus on information security, chief information security officers are still trying to be...
The criminal gang behind the Dyre malware will target more Spanish banks and Spain-based subsidiaries of other banks this summer with fraudulent wire transfers,...
Basic security hygiene dictates login credentials should never be shared. But a new survey from Centrify shows the practice is prevalent and poorly managed.
Login credentials belonging to 47 United States government agencies have been discovered on the public Web, intelligence firm Recorded Future said Wednesday.
Despite all the spending on cybersecurity, attackers are the ones winning the security war. And unless things change dramatically on the defense side, the...
Japan's largest mobile service provider, NTT DoCoMo, said it would replace passwords with biometric credentials on a number of its online services, in a...
The responsibility for the organization suffering a data breach lies squarely with the CEO, according to a new survey examining board-level attitudes about cybersecurity.
The attack group "Naikon" has spent the last five years successfully infiltrating national organizations around the South China Sea in search of geo-political intelligence,...
SAP has fixed multiple vulnerabilities in compression libraries used in several SAP products discovered by Core Security researchers. Administrators should check the Support Portal...
Attackers typically use one of three common techniques to compromise SAP systems at the application layer: pivoting, portal attacks, and database warehousing, according to...
"Re-Direct to SMB" Vulnerability Allows Attackers to Gain Access to Login Credentials Researchers from security firm Cylance have disclosed a security flaw which impacts...
Linux Foundation to Host Let's Encrypt, Project to Bring Free SSL Certs to Websites
The recent executive order signed by President Obama establishing a sanctions program for overseas cyber-attackers gives the government a new tool to deter malicious...
Companies are getting better at complying with payment card industry security standards, but experts believe that is only half of the story.
IBM researchers discovered a flaw in Dropbox's Android SDK which can leave mobile users vulnerable to attack.
The average large global enterprise has about 2,400 unsafe apps installed on the mobile devices in its environment, according to a new Veracode study.