News
News
- June 18, 2019
18 Jun'19
GandCrab decryption tool helps victims recover data
The No More Ransom initiative released one last GandCrab decryption tool to help victims recover data after the ransomware was allegedly shut down by its authors.
- June 18, 2019
18 Jun'19
Netskope announces enterprise application security platform
Netskope for Private Access is a cloud-based platform that secures private enterprise applications on public clouds and in on-premises data centers using zero-trust access.
- June 17, 2019
17 Jun'19
YubiKey FIPS recalled from government for reduced randomness
Yubico recalled YubiKey FIPS series devices after discovering an issue leading to reduced randomness in values generated by the keys, which are used by federal agencies.
-
- June 14, 2019
14 Jun'19
Dragos: Xenotime threat group targeting U.S. electric companies
Dragos says Xenotime, the threat group behind a devastating ICS attack in 2017, has been probing the networks of U.S. electric utilities and also attempted network intrusions.
- June 13, 2019
13 Jun'19
RAMBleed: New Rowhammer attack can steal data from memory
Security researchers developed a Rowhammer attack variant, called RAMBleed, that can steal data from memory and works even if systems are patched against Rowhammer.
-
Sponsored News
-
Server Security in the Era of ChatGPT
Sponsored by Dell Technologies and Intel - The importance of security and compliance to applications and data environments cannot be overstated. A GenAI platform deployment is different from a typical infrastructure as a service (IaaS) implementation in terms of who holds the keys and who can read the data. Research by TechTarget's Enterprise Strategy Group has found that even cloud-first organizations are deploying some workloads on premises, rather than the cloud, due to concerns related to data governance and sovereignty (cited by 42% of respondents) and security (cited by 34%). These organizations understand the real potential for data leakage associated with GenAI. See More
-
Dell Technologies GenAI-validated Designs and Dell Reference Designs
Sponsored by Dell Technologies and Intel - It's important to have the right infrastructure in place to support generative AI solutions. The intent should be to keep control of both proprietary data and associated GenAI-related business outcomes. See More
-
Sustainability, AI and Dell PowerEdge Servers
Sponsored by Dell Technologies and Intel - When it comes to energy efficiency and sustainability in IT, rightsizing is critical. Optimizing the infrastructure model and the right hardware needed to run it should be the goal. See More
-
A Generative AI Use Case Brought to Life with Solutions from Dell Technologies
Sponsored by Dell Technologies and Intel - Generative AI is not science fiction. It is real. Implementing and using generative AI is a goal within reach of any organization, not just large technology-centric ones. According to research by TechTarget's Enterprise Strategy Group, 92% of organizations will have generative AI in production within the next year. IT vendors such as Dell Technologies are currently working to bring AI to businesses, organizations and institutions in a manner customized to their unique needs. See More
-
- June 13, 2019
13 Jun'19
CrowdStrike IPO success puts spotlight on endpoint security
Cybersecurity firm CrowdStrike made its successful Wall Street debut Wednesday. The company closed its trading with a share price of $58.
- June 12, 2019
12 Jun'19
Election security threats increasing pressure on state governments
As local and state governments continue to tackle the evolving threat landscape, experts share tips on how to improve security posture and highlight the resources available for help.
- June 10, 2019
10 Jun'19
Google: Triada backdoors were pre-installed on Android devices
Google detailed the discovery and process of removing Triada malware after a supply chain attack led to backdoors being preinstalled on budget phones in overseas markets.
- June 06, 2019
06 Jun'19
NSA issues BlueKeep warning as new PoC exploit demos
The NSA issued a rare warning for users to patch against the BlueKeep vulnerability on the same day a security researcher demoed an exploit leading to a full system takeover.
- June 06, 2019
06 Jun'19
Why larger GDPR fines could be on the horizon
There haven't been many fines under the General Data Protection Regulation since the EU data privacy law went into effect a year ago. But experts warn that will likely change.
-
- June 05, 2019
05 Jun'19
Apple single sign-on option promises privacy for users
Apple is preparing its own single sign-on offering, called Sign In with Apple, which will focus on user privacy. But experts are split on how well this will work.
- June 04, 2019
04 Jun'19
Microsoft issues second BlueKeep warning urging users to patch
Microsoft again urged users to patch against the BlueKeep vulnerability as more potential exploits surface and one researcher discovered almost 1 million vulnerable systems.
- May 31, 2019
31 May'19
Docker vulnerability with no patch could allow root access
A security researcher disclosed a Docker bug that could allow an attacker to gain root-level access to a system. Docker signed off on the disclosure, despite a fix not yet being available.
- May 31, 2019
31 May'19
Ransomware attacks on local and state governments increasing
State and local governments are experiencing a rise in ransomware attacks. Experts sound off on what's triggering this trend and offer best practices for defense.
- May 31, 2019
31 May'19
New Sophos endpoint security software releases
Sophos has released Intercept X for Server with endpoint detection and response to protect users against blended threats and proactively detect stealthy attacks.
- May 30, 2019
30 May'19
Recorded Future acquired by private equity firm for $780 million
Recorded Future said the $780 million acquisition agreement with private equity firm Insight Partners affirms the growing importance of threat intelligence for enterprises.
- May 29, 2019
29 May'19
Tortuga launches Radix-M, new firmware security product
Tortuga Logic has launched a firmware security platform that automatically performs security validation of firmware on SoC designs using an existing platform from Cadence.
- May 29, 2019
29 May'19
Hackers scan for MySQL ransomware targets
A security researcher found that malicious actors have been scanning database servers for MySQL ransomware targets running on Windows, but mitigation should be relatively easy.
- May 28, 2019
28 May'19
Cylance CSO: Let's name and shame failed security controls
Malcolm Harkins, the chief security and trust officer at BlackBerry Cylance, says security controls that don't live up to their billing should be taking more blame for data breaches.
- May 24, 2019
24 May'19
CrowdStrike, NSS Labs settle legal disputes over product testing
CrowdStrike and NSS Labs have ended their legal dispute with a confidential settlement agreement, which resolves all lawsuits including NSS Labs' antitrust suit against the vendor.
- May 24, 2019
24 May'19
Barracuda Advanced Bot Protection safeguards web applications
Advanced Bot Protection is a cloud-hosted platform that defends against automated threats using AI. It is available as both a web application firewall (WAF) and WAF as a service.
- May 23, 2019
23 May'19
Microsoft bets on ElectionGuard SDK to fortify election security
Ahead of the 2020 elections, Microsoft unveiled ElectionGuard, an open source SDK designed to provide end-to-end verification of electronic voting machine results.
- May 23, 2019
23 May'19
'BlueKeep' Windows Remote Desktop flaw gets PoC exploits
Multiple researchers created proof-of-concept exploits, including remote code execution attacks, targeting the recently patched Windows Remote Desktop flaw called BlueKeep.
- May 22, 2019
22 May'19
Risk & Repeat: Cisco vulnerabilities raise backdoor concerns
This week's Risk & Repeat podcast looks at vulnerabilities in Cisco and Huawei products, which have raised concerns about backdoor access in networking equipment.
- May 17, 2019
17 May'19
How Google turned 1.5 billion Android phones into 2FA keys
Google product manager Christiaan Brand discusses the journey to making 1.5 billion Android devices work as 2FA security keys and the plan for the future.
- May 16, 2019
16 May'19
New executive order moves to ban Huawei
U.S. businesses are barred from dealing with Huawei following an executive order from the White House and the additions of Huawei and its affiliates to a trade blacklist.
- May 16, 2019
16 May'19
ZombieLoad: More side channel attacks put Intel chips at risk
Another set of side channel vulnerabilities were discovered in Intel chips. Security researchers explain the risks posed by the flaws and offer advice on mitigation steps.
- May 15, 2019
15 May'19
Women in cybersecurity work to grow voice in US lawmaking
To encourage more input from women in cybersecurity in the legislative process, the Executive Women's Forum went to Washington to discuss key issues with Congress.
- May 15, 2019
15 May'19
WannaCry infections continue to spread 2 years later
Two years after the initial wave of WannaCry attacks, security researchers said the ransomware continues to spread to vulnerable devices even though it's not encrypting data.
- May 14, 2019
14 May'19
Verizon DBIR: Ransomware still a major threat, despite reports
The 2019 Verizon Data Breach Investigations Report challenges the wisdom that cryptomining attacks replaced ransomware as the dominant malware threat last year.
- May 14, 2019
14 May'19
Zero-day WhatsApp vulnerability could lead to spyware infection
A zero-day vulnerability in WhatsApp was used in targeted attacks that involved installing spyware on mobile devices, which may be the work of an advanced threat actor.
- May 10, 2019
10 May'19
Effects of cybersecurity skills shortage worsening, new study says
The cybersecurity skills shortage is putting businesses at risk in a variety of ways, according to a new study. Experts suggest ways to combat the problem.
- May 10, 2019
10 May'19
Symantec CEO Greg Clark unexpectedly steps down
Cybersecurity giant Symantec is searching for a new CEO once again after Greg Clark unexpectedly resigned from the vendor after three years at the helm.
- May 09, 2019
09 May'19
Google focuses more on steering the Android ship than righting it
Google's security and privacy upgrades to Android are mostly forward-thinking changes, readying for a future that is inevitable but unclear, rather than ways to improve security today.
- May 08, 2019
08 May'19
Google I/O 2019 keynote brings focus on security and privacy
After being a no-show at last year's conference, security and privacy improvements were big themes at Google I/O's first day, including discussion on federated learning.
- May 08, 2019
08 May'19
2019 Verizon DBIR highlights cyberespionage, nation-state attacks
The 2019 Verizon Data Breach Investigations Report showed significant increases in cyberespionage and nation-state activity. It also painted a gloomy picture for email threats.
- May 06, 2019
06 May'19
Enterprise security threats rising, consumer attacks falling
Cybercriminals are increasingly taking aim at businesses, according to a recent Malwarebytes report. Security experts weigh in on best practices for defending against malware attacks.
- May 06, 2019
06 May'19
Cisco SSH vulnerability sparks debate over backdoors
Cisco released a patch for a critical vulnerability in Nexus 9000 switches that could allow a remote attacker to gain root access because of the use of a default SSH key pair.
- May 02, 2019
02 May'19
CrowdStrike tackles BIOS attacks with new Falcon features
CrowdStrike added firmware attack detection capabilities to its Falcon platform and also expanded its partnership with Dell to help organizations tackle BIOS threats.
- May 02, 2019
02 May'19
White Ops: Ad fraud bot activity waning, but threats still loom
A new study from security vendor White Ops shows a decline in digital ad fraud, but the company says the battle against cybercriminals abusing ad platforms is far from over.
- May 01, 2019
01 May'19
DHS patching directive brings shorter deadlines
A new DHS directive placed new deadlines on patching critical vulnerabilities for federal agencies and experts are divided on whether the timelines are reasonable and realistic.
- May 01, 2019
01 May'19
Huawei ban highlights 5G security issues CISOs must tackle
Why worry over Huawei? A U.S. ban of this Chinese company's products should remind CISOs that now is the time to consider security issues related to the rollout of the 5G network.
- April 30, 2019
30 Apr'19
A recent history of Facebook security and privacy issues
Since the start of 2018, Facebook has had a seemingly constant cascade of security issues and privacy scandals. Here's a look back at the social media giant's most serious issues.
- April 30, 2019
30 Apr'19
Inside the 'Master134' malvertising campaign
This six-part series examines the unique malvertising campaign known as Master134 and the role that various digital advertising networks played in the threat.
- April 30, 2019
30 Apr'19
Inside 'Master134': Propeller Ads connected to malvertising campaign
A SearchSecurity investigation determined ad network Propeller Ads played a significant role in the early stages of the Master134 malvertising campaign.
- April 30, 2019
30 Apr'19
Inside 'Master134': Ad networks' 'blind eye' threatens enterprises
Online ad networks linked to the Master134 malvertising campaign and other malicious activity often evade serious fallout and continue to operate unabated.
- April 30, 2019
30 Apr'19
'Master134' malvertising campaign raises questions for online ad firms
Malvertising and adware schemes are a growing concern for enterprises. Our deep investigation into one campaign reveals just how complicated threats can be to stop.
- April 30, 2019
30 Apr'19
Inside 'Master134': ExoClick tied to previous malvertising campaigns
Online ad network ExoClick denied any involvement in the Master134 campaign, but the company has ties to similar malvertising threats.
- April 30, 2019
30 Apr'19
Inside 'Master134': More ad networks tied to malvertising campaign
Check Point's report on the Master134 malvertising campaign implicated five ad networks, but a SearchSecurity investigation revealed more companies were involved.
- April 30, 2019
30 Apr'19
Inside 'Master134': Adsterra's history shows red flags, abuses
Adsterra denied it was involved in the Master134 malvertising campaign, but a review of the company's history reveals many red flags, including activity in a similar campaign.
- April 26, 2019
26 Apr'19
FBI report says BEC attacks are increasing, evolving
According to the FBI's 2018 Internet Crime Report, business email compromise attacks are on the rise. Security experts highlight how BEC scams are evolving.
- April 26, 2019
26 Apr'19
Carbanak malware was recording video of victims' desktops
Researchers from FireEye spent hundreds of hours analyzing the Carbanak backdoor malware and its source code and were surprised by some of the features it contained.
- April 24, 2019
24 Apr'19
Flashpoint responds to evolving dark web threats
Cybersecurity firm Flashpoint updated its threat intelligence platform to better address evolving techniques and practices on the dark web, such as encrypted chat usage.
- April 24, 2019
24 Apr'19
Carbanak source code found on VirusTotal 2 years ago
The source code for the Carbanak backdoor was found in a VirusTotal archive two years ago, and security researchers are now sharing the analysis of the source code publicly.
- April 22, 2019
22 Apr'19
Marcus 'MalwareTech' Hutchins pleads guilty to Kronos charges
Marcus 'MalwareTech' Hutchins, known as being an integral player in stopping the WannaCry ransomware outbreak, pleads guilty to conspiring to create and distribute the Kronos banking Trojan.
- April 22, 2019
22 Apr'19
IoT device testing made possible with BeStorm X
BeStorm X, a black-box fuzzer by Beyond Security and Ubiquitous AI, tests IoT devices to identify security weaknesses and vulnerabilities before they're exploited.
- April 19, 2019
19 Apr'19
Forcepoint pushes 'human-centric cybersecurity' approach
During the launch of the Forcepoint Cyber Experience Center in Boston, Forcepoint execs emphasized the need for adopting a new approach to cybersecurity that focuses on the human factor.
- April 19, 2019
19 Apr'19
DNS hijacking campaign targets national security organizations
A DNS hijacking campaign targeting national security organizations and critical infrastructure may be part of a new trend, according to the researchers behind recent attacks.
- April 16, 2019
16 Apr'19
Microsoft disputes Outlook data breach report
Microsoft warned Outlook users who may have had data compromised in an attack using customer support login credentials to access account information over the course of months.
- April 15, 2019
15 Apr'19
Blue Hexagon bets on deep learning AI in cybersecurity
Cybersecurity startup Blue Hexagon uses deep learning to detect network threats. Security experts weigh in on the limitations of AI technologies in cybersecurity.
- April 15, 2019
15 Apr'19
New programs released aim to improve Google Cloud security
With the release of programs like Access Transparency, Virtual Private Cloud and GKE Sandbox, Google aims to improve Google Cloud security and identity protection.
- April 12, 2019
12 Apr'19
WPA3 flaws found in Dragonfly handshake
Researchers discovered vulnerabilities in the WPA3 protocol, specifically in the Dragonfly handshake authentication, allowing for multiple exploits branded Dragonblood.
- April 11, 2019
11 Apr'19
Huawei security questioned around the world
Troubles continue for Huawei as new bans and government reports put security into question, but the company is attempting to fight back against the criticism.
- April 11, 2019
11 Apr'19
New Baldr information stealer could target businesses
Malwarebytes explains why the rapidly evolving info-stealer Baldr could spell trouble for businesses and consumers, and offers pointers on how to defend against such malware.
- April 10, 2019
10 Apr'19
Nokia: 5G network slicing could be a boon for security
According to Nokia's Kevin McNamee, the rise of 5G will mean more danger of IoT botnets, but also more options to secure those devices -- including using network slicing for segmentation.
- April 09, 2019
09 Apr'19
NSS Labs CTO Jason Brvenik talks security testing challenges
NSS Labs CTO Jason Brvenik talks about his company's relationship with security vendors following the company's antitrust suit against several endpoint protection vendors last year.
- April 05, 2019
05 Apr'19
Radware: DDoS amplification attacks increasing, evolving
As DDoS attacks continue to evolve, planning for DDoS attack prevention and mitigation has become a critical business priority. Radware's Daniel Smith offers advice.
- April 04, 2019
04 Apr'19
Pipdig WordPress plugin accused of DDoS attacks and backdoors
Pipdig, a blog theme and plugin company, was accused of using obfuscated code to gain backdoor access to customer blogs and launch low-scale DDoS attacks on rivals.
- April 03, 2019
03 Apr'19
'Triple threat' malware campaign combines Emotet, TrickBot and Ryuk
Cybereason sounds off on the recently discovered 'triple threat' campaign and highlights interesting features of the attack technique used by cybercriminals.
- April 03, 2019
03 Apr'19
Proof-of-concept Magento exploit used in attacks
Experts are urging users to patch after a proof-of-concept Magento exploit was picked up by malicious actors and used in attempted attacks on e-commerce websites.
- March 29, 2019
29 Mar'19
Study: Cybersecurity professionals taking on more data privacy duties
At the SecureWorld Boston conference, ISSA unveils data that shows cybersecurity professionals are taking on more data privacy duties. Experts sound off on what it signifies.
- March 28, 2019
28 Mar'19
NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released the results of its new endpoint protection group test at RSA Conference 2019. NSS Labs CTO Jason Brvenik talks about the results, testing challenges and more.
- March 28, 2019
28 Mar'19
Ghidra update squashes serious bugs in NSA reverse-engineering tool
The NSA answered lingering questions around what kind of support it would provide for Ghidra after releasing the tool as open source with a patch that fixed serious bugs.
- March 26, 2019
26 Mar'19
CrowdStrike: Cybercrime groups joining forces to pack more punch
CrowdStrike sounds off on the enhanced partnership between the cybercrime groups behind the TrickBot and BokBot malware and explains what such collaborations signify.
- March 26, 2019
26 Mar'19
2019 RSA Conference bottom line: People are security's strongest asset
People in the security community and beyond are more important and influential than the leading technologies if the talk at the 2019 RSA Conference is any indication.
- March 26, 2019
26 Mar'19
Asus backdoor hits targets with officially signed update
Attackers infected the official Asus Live Updater to install a malicious backdoor on hundreds of thousands of systems, with the intent of targeting a small subset of those users.
- March 25, 2019
25 Mar'19
FEMA data exposure affects 2.3 million disaster victims
FEMA's data exposure is another high-profile example of accidental data disclosures -- a trend that has some security experts calling for more focus on failed security controls.
- March 22, 2019
22 Mar'19
Study reveals sale of SSL/TLS certificates on dark web
Security researchers discovered the availability of SSL/TLS certificates for sale on the dark web, which allow cybercriminals to disguise their malicious activity as legitimate.
- March 22, 2019
22 Mar'19
Hundreds of millions of Facebook passwords exposed internally
Facebook learned three months ago that hundreds of millions of passwords were stored internally in plaintext, but it didn't disclose the issue or notify users until the news leaked.
- March 22, 2019
22 Mar'19
Risk & Repeat: RSA Conference 2019 in review
This week's 'Risk & Repeat' podcast looks back at RSA Conference and discusses the show's diversity and inclusion efforts as well as the top trends and sessions from the show.
- March 22, 2019
22 Mar'19
Chris Wysopal talks blockchain hype and realistic uses
While marketers ride the hype train around blockchain, Chris Wysopal says there are realistic uses for the technology. And there are blockchain risks that need to be considered, as well.
- March 20, 2019
20 Mar'19
New Mirai malware variant targets enterprise devices
Researchers from Palo Alto Networks have spotted a new variant of the Mirai botnet that is targeting enterprise presentation systems and digital signage with 11 new exploits.
- March 20, 2019
20 Mar'19
Experts praise Norsk Hydro cyberattack response
Aluminum manufacturer Norsk Hydro was hit with ransomware that forced a switch to manual operations. The company's incident response has experts impressed.
- March 19, 2019
19 Mar'19
Bobbie Stempfley: Cybersecurity AI has a long way to go
Many cybersecurity vendors have embraced AI and machine learning, but CERT Division's Bobbie Stempfley says more work is needed around testing algorithms and validating results.
- March 19, 2019
19 Mar'19
Critical WinRAR bug exploited in targeted attacks
A critical WinRAR bug that was exposed after 19 years is already being exploited in targeted attacks in the Middle East and United States, despite the availability of patch.
- March 15, 2019
15 Mar'19
Despite reservations about NSA's Ghidra, experts see value
The NSA's reverse-engineering tool, Ghidra, was released to the public and despite some initial concerns experts are generally bullish on the prospects for the free software.
- March 13, 2019
13 Mar'19
Election security threats loom as presidential campaigns begin
Fragile electronic voting systems and the weaponization of social media continue to menace U.S. election systems as presidential candidates ramp up their 2020 campaigns.
- March 13, 2019
13 Mar'19
SANS Institute: DNS attacks gaining steam in 2019
At RSA Conference 2019, experts from the SANS Institute discuss the most dangerous attack techniques they've seen, including DNS manipulation and domain fronting.
- March 13, 2019
13 Mar'19
Citrix data breach report raises more questions
Citrix disclosed a potential data breach blamed on poor password security, but a lack of details about the attack leaves only unconfirmed claims from a single cybersecurity firm.
- March 11, 2019
11 Mar'19
Zscaler charts sharp increase in SSL threats like phishing, botnets
Threat actors are exploiting encryption protocols to deliver malicious content, according to Zscaler, which found a 400% increase in SSL-based phishing threats last year.
- March 08, 2019
08 Mar'19
VMware firewall strategy to focus on 'known good' behavior
VMware is taking a different approach to firewalls by focusing on 'known good' behavior to better police east-west traffic within enterprise environments.
- March 08, 2019
08 Mar'19
Battling misinformation focus of Facebook, Twitter execs' talk
Facebook and Twitter executives say finding a pattern of malicious activity is more effective in identifying bad actors on sites than looking at the misleading information itself.
- March 07, 2019
07 Mar'19
Nation-state threats grow more sophisticated, converge on targets
Incident response experts say nation-state cyberattacks are so common that they find threat actors from multiple nations operating in the same victim environment.
- March 07, 2019
07 Mar'19
Microsoft promotes zero-trust security over firewalls
Microsoft told RSA Conference attendees a zero-trust model is better than firewalls for protecting corporate data -- a stance that some said doesn't go far enough.
- March 07, 2019
07 Mar'19
RSAC 2019: Coverage of the premiere security gathering
Find out what's happening at the at the 2019 RSA Conference in San Francisco, the information security industry's biggest event, with breaking news and analysis by the SearchSecurity team.
- March 07, 2019
07 Mar'19
FBI: How we stopped the Mirai botnet attacks
FBI Special Agent Elliott Peterson gave RSA attendees a behind-the-scenes look at the investigation into the Mirai botnet following the devastating DDoS attacks in 2016.
- March 07, 2019
07 Mar'19
Cryptography techniques must keep pace with threats, experts warn
Cryptographers at RSAC 2019 discussed personal data protection laws and challenges, future threats and the pressure for tech companies to work with law enforcement on decryption.
- March 06, 2019
06 Mar'19
FBI director calls for public-private cybersecurity partnerships
At the recent RSA Conference, FBI Director Christopher Wray called for public-private partnerships to fend off cyberadversaries and threats.
- March 06, 2019
06 Mar'19
Cisco: Network security strategy requires IT, OT to play nice
Cisco told RSA attendees the need for network security on the factory floor is growing. Cisco says cooperation between IT and operations is key to protecting equipment.
- March 06, 2019
06 Mar'19
NSA releases Ghidra open source reverse-engineering tool
The National Security Agency launched its highly anticipated reverse-engineering tool, Ghidra. The free software offers features found in high-end commercial products.