Category Archives: News
Locky Ransomware Variant Slips Past Some Defenses

Ransomware called IKARUSdilapidated is managing to slip into unsuspecting organizations as an unknown file. Source: threatpost.com/ Locky Ransomware Variant Slips Past Some Defenses

North Korean Cyberspies Target US Defense Contractors Following Nuclear Threats

The North Korean cyber-espionage group known as the Lazarus Group has been busy hacking US defense contractors, according to a report published on Monday by security research firm Palo Alto…

North Korean Cyberpies Target US Defense Contractors Following Nuclear Threats

The North Korean cyber-espionage group known as the Lazarus Group has been busy hacking US defense contractors, according to a report published on Monday by security research firm Palo Alto…

3 Questions Successful Security Leaders Should Ask

Communication consultant Michael Santarcangelo outlines three key questions CISOs should ask at the outset of any project to convey security’s value and clearly set expectations Source: Bank Info Security …

Supply Chain Woes, Again: NetSarang Popped

Server Management Vendor Backdoored; Updates IssuedThere’s little defense against software updates that have been seeded with malicious code. Kaspersky Lab says attackers planted a backdoor in software updates from network…

Rent the Latest Exploit Toolkit for $80 Per Day

Underground Forum Markets ‘Disdain’ Kit to Target Flaws in WebEx, Flash, MoreFor just $80 per day, would-be cybercrime entrepreneurs can subscribe to Disdain, a new exploit kit that targets now-patched…

Locky Ransomware switches to the Lukitus extension for Encrypted Files

Today a new Locky Ransomware variant was discovered that switches to the .lukitus extension for encrypted files. It is not currently known how this variant is being distributed, but as the…

News in brief: micro robots heal mice; Scottish Parliament hacked; Google Allo on desktops

Your daily round-up of some of the other stories in the news Source: Naked Security Sophos News in brief: micro robots heal mice; Scottish Parliament hacked; Google Allo…

Information Security Spending to Reach $93 Billion in 2018: Gartner

Gartner has predicted that worldwide information security spending will reach $86.4 billion in 2017; a seven percent growth over the year. Spending is expected to increase to $93 billion in…

Flash’s Final Countdown Has Begun

The impending demise of Adobe Flash will create legacy challenges similar to Windows XP as companies begin to wean themselves off the vulnerable code base. Source: threatpost.com/ Flash’s Final…

SyncCrypt Ransomware Hides Inside JPG Files, Appends .KK Extension

A new ransomware called SyncCrypt was discovered that is being distributed by spam attachments pretending to be court orders. This ransomware uses a interesting approach of embedding a zip file in…

Maersk Shipping Reports $300M Loss Stemming from NotPetya Attack

A.P. Moller -Maersk said June’s NotPetya wiper malware attacks would cost the world’s largest shipping container company $300M USD in lost revenue. Source: threatpost.com/ Maersk Shipping Reports 0M Loss…

New Episode of Game of Thrones Leaks on Torrent Sites After Colossal HBO Blunder

Episode 6 of Game of Thrones season 7 has leaked online on streaming, torrent, and file-sharing portals after HBO accidentally broadcast the episode via its on-demand streaming platform. […] …

Pulse Wave DDoS Attacks Disrupt Hybrid Defenses

A new method of launching distributed denial-of-service (DDoS) attacks dubbed “pulse wave” can be highly effective against organizations using “appliance first, cloud second” hybrid mitigation solutions, Imperva Incapsula warned on…

Judge orders LinkedIn to stop blocking third-party use of your data

How do you feel about other companies scraping your public information from LinkedIn and monetizing it? Source: Naked Security Sophos Judge orders LinkedIn to stop blocking third-party…

Next Page