June 6, 2016 New Research Finds 10 Percent of NFS Servers Globally Are at Risk 2 min read - According to a recent study from a security firm, 10 percent of NFS servers globally are at risk for data leakage. Here's what you need to know.
June 6, 2016 New ICS Malware Irongate Channels Stuxnet to Scam SCADA Systems 2 min read - A newly discovered ICS malware called Irongate is eerily similar to the Stuxnet worm in the way it goes after SCADA and industrial control systems.
June 6, 2016 Another SWIFT Attack Speeds Worry About Response — and Responsibility 2 min read - News of another SWIFT attack has the network and banks arguing about incident response — and disagreeing about with whom the responsibility lies.
June 2, 2016 New Zero-Day Exploit Hits the Malware Market 2 min read - Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.
June 1, 2016 No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs 2 min read - A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
June 1, 2016 ‘Perfect’ Data Exfiltration Demonstrated 2 min read - Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
May 31, 2016 Moxa Vulnerabilities Surge in ICS Devices 2 min read - A security researcher recently identified three Moxa vulnerabilities that could put industrial control systems at risk if not addressed.
May 31, 2016 Faster Searches, Less Space With QRadar Security Intelligence 2 min read - QRadar Security Intelligence now offers faster data searches for its users in addition to a host of other improvements and new features.
May 30, 2016 Sandjacking: New iOS Threat Lets Attackers Out of the Box 2 min read - A newly discovered iOS threat called sandjacking could affect any user or app if cybercriminals gain physical access to a mobile device.
May 26, 2016 Stuck in the Middle: MitM Attacks Could Stem From Well-Intentioned WPAD Use 2 min read - Enterprises may have had lofty intentions for the use of the WPAD protocol, but the reality is that it could expose them to MitM attacks.