China's National Cybersecurity Standards Considered a Risk for Foreign Firms

The Chinese government may use a collection of 300 so-called “national cybersecurity standards” to deter or sabotage the efforts of foreign tech firms trying to enter the Chinese market. […] …

Widespread Phishing Campaign Targets Financial Institutions

A phishing attack on Wednesday fueled by the Necurs botnet targeted at least 2,700 banking institutions of various sizes in the U.S. and around the world, explains Aaron Higbee of…

What Does 'Threat Analytics' Really Mean?

Gerry Sillars of Skybox on How to Operationalize ItThreat analytics involves understanding where threats to key data assets exist and planning your mitigation strategy around that, says Skybox’s Gerry Sillars. …

Fighting Sandbox-Evading Malware

Verizon’s Ashish Thapar Shares Tips and TechniquesMalware detection needs to shift to detecting anomalous behavior, rather than depending on signature-based detection technologies to deal with such threats as sandbox-evading malware,…

Planning for the Shifting Threat Landscape

RSA’s CTO, Zulfikar Ramzan, Shares His View of the Challenges AheadThe best way to take a holistic approach to the current threat landscape is to define security issues as business…

Growing IT-OT Integration: Addressing the Risks It Brings

IBM Security’s Paul Garvey on Taking the Right ApproachWhile IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional…

The Week in Ransomware – August 17th 2018 – Princess Evolution & Dharma

The biggest news was the release of the Princess Evolution RaaS and a new variant of the Dharma ransomware utilizing the .cmb extension for encrypted files. Otherwise, it was mostly small…

Windows 10 Build 17741 Released With New Build Number & Clipboard Changes

Windows 10 Preview Build 17741 is now available for Insiders in the Fast Ring and it comes with a Your Phone desktop pin, new build number, and greater memory for…

Philips Vulnerability Exposes Sensitive Cardiac Patient Information

The unpatched flaw would allow a bad actor to execute information-exfiltrating malware, backdoors, ransomware or any other kind of bad code he or she chose. Source: threatpost.com/ Philips Vulnerability…

Unique Malspam Campaign Uses MS Publisher to Drop a RAT on Banks

A new email campaign includes a Microsoft Office Publisher file with malicious URLs leading to the FlawedAmmyy RAT. Source: threatpost.com/ Unique Malspam Campaign Uses MS Publisher to Drop a…

Severe PHP Exploit Threatens WordPress Sites with Remote Code Execution

The issue impacts several content management systems, including Typo3 and WordPress, as well as widely-used PDF generation library TCPDF. Source: threatpost.com/ Severe PHP Exploit Threatens WordPress Sites with Remote…

Flaws in Smart Irrigation Systems Expose Water Utilities to Botnet-Grade Attacks

Smart water irrigation systems deployed across a city, region, or even a country, can be hijacked by nefarious threat actors who could cause a mass water crisis by forcing these…

Combating Social Engineering: Tips From Black Hat 2018

Social engineering is the use of deception to manipulate individuals into disclosing sensitive information that may be used to compromise a network, infiltrate an organization, gain access to trade secrets,…

Microsoft Launcher Beta for Android Gets A Big Update

Microsoft has just released a big update for Microsoft Launcher on Android and this time it includes several new features. This new released brings the Microsoft Launcher to version 4.13 and continues…

AT&T Faces $224M Legal Challenge Over SIM-Jacking Rings

Cryptocurrency angel investor Michael Terpin seeks damages for “gross negligence” by the carrier, alleging it turned a blind eye to store employees’ malicious activities. Source: threatpost.com/ AT&T Faces 4M…

Next Page