Please turn on your JavaScript for this page to function normally.
danger
Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining …

colors
Securing and managing the enterprise Internet of Things

A future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers …

Adobe Flash
Fake Flash updaters deliver cryptominers AND update Flash

Cryptominers have dethroned ransomware as the top malware threat and cybercriminals are coming up with new ways to keep the mining activity secret from the victims. One of …

Palo Alto Networks to acquire RedLock

Palo Alto Networks announced that it has entered into a definitive agreement to acquire RedLock. Under the terms of the agreement, Palo Alto Networks will pay approximately …

Apache Struts
PoC exploit for critical Apache Struts flaw found online

The Apache Software Foundation revealed last week the existence of a critical Apache Struts flaw (CVE-2018-11776) similar to the one exploited in the Equifax breach and urged …

CyberMDX raises $10 million Series A to expand medical cybersecurity to hospitals worldwide

CyberMDX announced the completion of a $10 million Series A financing. The round was led by Pitango Venture Capital, with participation from OurCrowd Qure. The number of …

wallet
Cryptocurrency-stealing malware relies on victims copy-pasting wallet info

An unconventional email spam campaign has been delivering unusual cryptocurrency-stealing malware to American and Japanese users. The emails are sporting “Re: …

IoT
IoT malware targeting zero-day vulnerabilities

Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was …

abstract
New infosec products of the week​: September 29, 2017

Fortanix launches runtime encryption using Intel SGX Fortanix’ Self-Defending Key Management Service (SDKMS) is a cloud service delivering runtime encryption technology to …

architecture
New infosec products of the week​: September 1, 2017

Palo Alto Networks announces Next-Generation Security Platform for VMware Cloud on AWS Palo Alto Networks announced its Next-Generation Security Platform is available to …

tech
New infosec products of the week​: June 16, 2017

Uplevel Systems unveils managed VPN service infrastructure Uplevel Systems has added VPN capabilities to its hybrid managed service platform to help providers differentiate …

Android
Ewind Android adware is actually a full-fledged Trojan

Palo Alto Networks researchers have analyzed a string of legitimate-looking Android apps and have discovered that the adware included in them has the potential to do much more …

Don't miss

Cybersecurity news