Security Experts:

long dotted


A code execution vulnerability (CVE-2018-15961) patched by Adobe in ColdFusion in September has been exploited in the wild by an APT group and possibly others [Read More]
23-year-old Austin Thompson from Utah has pleaded guilty to launching DDoS attacks on gaming companies in 2013 and 2014. He was known online as DerpTrolling [Read More]
Cyber National Mission Force unit of the U.S. Cyber Command has created a VirusTotal account for sharing unclassified malware samples [Read More]
In the wake of the Morris worm, Carnegie Mellon University established the world’s first Cyber Emergency Response Team, which has been replicated in the federal government and around the world. [Read More]
World Wide Web inventor Tim Berners-Lee called for a "contract" to make internet safe and accessible for everyone, saying the internet has deviated from the goals its founders had envisaged. [Read More]
Hackers have been targeting Iranian users of Telegram and Instagram with fake login pages, app clones and BGP hijacking in attacks that have been ongoing since 2017, Cisco Talos reveals. [Read More]
Facebook said it blocked some 30 accounts on its platform and 85 more on Instagram after police warned they may be linked to "foreign entities" trying to interfere in the US midterm election. [Read More]
Iran accused Israel on Monday of launching a failed cyber attack against its communications systems. [Read More]
An IRC bot built using Pearl is targeting IoT devices and Linux servers, but can also affect Windows systems and Android devices, Trend Micro warns. [Read More]
The office of Secretary of State Brian Kemp, who is also the Republican gubernatorial nominee, said it is investigating the state Democratic Party in connection with an alleged attempt to hack Georgia's online voter database [Read More]


rss icon

Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Alastair Paterson's picture
By closely following trends watching for new activities and actors across a variety of data sources, security professionals can continue to take steps to mitigate the digital risk to their enterprises, partners and customers.
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.