Sophos warns of a ‘protection racket’ scam email that threatens to infect victims with the ransomware variant if they don’t pay the attackers. A widespread new email scam purportedly...
Read moreArtificial Intelligence & the Security Market
June 22 2018A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs. Machine learning, advanced heuristics, or artificial intelligence:...
Read moreMore than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months. Incidents like last year’s...
Read morePatch and Update
June 22 2018The SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreA series of newly disclosed vulnerabilities could allow an attacker to gain control of industrial switches. Phoenix Contact has disclosed four vulnerabilities in switches in the FL SWITCH industrial...
Read moreAppSec in the World of ‘Serverless’
June 21 2018The term ‘application security’ still applies to ‘serverless’ technology, but the line where application settings start and infrastructure ends is blurring. “Serverless” computing is essentially an application deconstructed to...
Read moreThreat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says. An advanced persistent threat group...
Read moreHackers are using the infrastructure, meant to transmit data between applications, for command and control. The security tools and strategies financial services organizations use to protect their data could be...
Read moreReporting an Incident
June 21 2018We know you care about protecting your computer and mobile devices and take steps to secure them. However, no matter how securely you use technology, you may eventually be...
Read moreInside a SamSam Ransomware Attack
June 21 2018Here’s how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown. Hospitals, municipal governments, and schools are bracing themselves, anxiously aware that...
Read more
Recent Comments