The Matrix ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too...
Read moreThe operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals. A threat...
Read moreThe operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals. A threat...
Read moreAn alleged top boss of a Romanian crime syndicate that U.S. authorities say is responsible for deploying card-skimming devices at Automated Teller Machines (ATMs) throughout North America was arrested...
Read moreAn alleged top boss of a Romanian crime syndicate that U.S. authorities say is responsible for deploying card-skimming devices at Automated Teller Machines (ATMs) throughout North America was arrested...
Read morePython-Based Bot Scanner Gorging on Recon Intel
April 5 2019Discovered by ATT AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services A new Python-based bot scanner is snaking its way through...
Read morePython-Based Bot Scanner Gorging on Recon Intel
April 5 2019Discovered by ATT AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services A new Python-based bot scanner is snaking its way through...
Read moreTwo third-party services left Facebook user data exposed online — in one case, 540 million records of user comments — highlighting the ease with which third-party developers can access...
Read moreTwo third-party services left Facebook user data exposed online — in one case, 540 million records of user comments — highlighting the ease with which third-party developers can access...
Read moreTrue Cybersecurity Means a Proactive Response
April 5 2019Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security. Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems...
Read more
Recent Comments