 
                                Microsoft updates break AV software, again!
Microsoft’s May 2019 security fixes have again disrupted the normal functioning of some endpoint security products on certain Windows versions. Current problems …
 
                                IT managers can’t ignore endpoints because most cyberattacks start there
IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint …
 
                                Stealthy cryptomining apps still on Google Play
Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. …
 
                                How the SamSam attacker stole millions from US companies
There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …
 
                                Photo gallery: Infosecurity Europe 2018 Expo, part 2
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
 
                                Thousands of government, orgs’ websites found serving crypto mining script
On Sunday, over 4,200 websites around the world started hijacking visitors’ browsers to mine the Monero crypto currency. The attack The problem was first noticed and …
 
                                Malware creators increasingly run their business like legitimate software companies
The continuing increase in ransomware attacks is, partly, due to how easy the malware can be built and used by attackers that have limited technical skills. Take for example …
 
                                Is Europe ready for GDPR?
What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? Vanson Bourne surveyed 625 IT decision makers in four countries and found that the UK is …
 
                                Super Free Music Player is the latest malware on Google Play
Another day, another piece of malware lurking on Google Play, masquerading as a free and helpful app. This time it’s called “Super Free Music Player” and is …
 
                                UK residents hit with extremely personalized scam emails
A compelling and potentially very successful email spam campaign is being leveraged against UK residents, warns Sophos researcher Paul Ducklin. The email addresses the …
 
                                New infosec products of the week: March 3, 2017
Nehemiah Security’s AtomicEye RQ quantifies the effects of cyber exploits Nehemiah Security released AtomicEye RQ (Risk Quantifier). Engineered to replicate a network …
 
                                AKBuilder: A builder for exploit-laden Word documents
One doesn’t have to be a great coder to become a successful cybercriminal, as underground markets are filled with offerings that automate one or another step of an …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does