June 21, 2017 DVRs Prove IoT Malware Is Still Dangerous 2 min read - With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
June 20, 2017 Hidden PHP Rootkits Unearthed, Putting Apache Modules at Risk 2 min read - A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
June 20, 2017 IBM i2 QRadar Offense Investigator: The New i2 Cyber Threat Hunting App 2 min read - The all-new IBM i2 QRadar Offense Investigator makes it easier for cyberanalysts to gather and pinpoint data trends regarding vulnerabilities and threats.
June 19, 2017 Welcome to the New European X-Force Command Center in Wroclaw, Poland 3 min read - This week, IBM opened its refurbished and expanded X-Force Command Center in Wroclaw, Poland, to help clients manage their EU-based data more securely.
June 16, 2017 SOX Compliance Is an Ongoing Process 2 min read - Protiviti's "2017 Sarbanes-Oxley Compliance Survey" revealed that companies are dedicating more resources to SOX compliance than in past years.
June 15, 2017 DLP Dangers? Collaboration Violations Put Cloud Security at Risk 2 min read - Data loss prevention (DLP) policies aren't doing enough to combat collaboration tool violations. What does this mean for cloud security?
June 14, 2017 Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner 2 min read - Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
June 13, 2017 Rotten Apples: MacSpy, MacRansom Bring Malware-as-a-Service Model to MacOS 2 min read - The first Mac malware-as-a-service threats suggests attackers are starting to see the operating system as a potential target.
June 13, 2017 New Linux Trojan Discovery Unveils Cryptomining in Raspberry Pi and Identity Cloaking Efforts 2 min read - Two new linux Trojan strains have been discovered: One attempts to mine cryptocurrency, while the other cloaks the threat actor's identity.
June 12, 2017 New Android Cleaning App Pulls Dirty Tricks to Grab Admin Rights 2 min read - A new Android app that claims to clean a device actually grabs admin rights to carry out malicious actions — and proves almost impossible to scrub out.