Please turn on your JavaScript for this page to function normally.
Compromised enterprise networks fuel 236 percent increase in viruses and worms

Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …

How businesses interpret and use threat intelligence

A new IDC study of 300 large UK companies found that: 96% of UK firms already use threat intelligence products and services; all of those surveyed intend to do so within the …

Raw threat data is not effective, it’s time for threat intelligence

A new Ponemon Institute survey includes insight from 692 IT and IT security professionals from both global businesses and government agencies, who answered more than …

Hacking Team pitches encryption-cracking tools to US law enforcement

Hacking Team, the Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies, is back in the saddle, …

Leaked Hacking Team emails show Saudi Arabia wanted to buy the company

Emails stolen in the Hacking Team breach and leaked online by the still unknown attackers continue to be analyzed, and offer insight into the inner workings and controversial …

Zero-day disclosure-to-weaponization period cut in half

There’s no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers.Not only did it contain a …

Hacking Team’s RCS Android: The most sophisticated Android malware ever exposed

“As each day passes and researchers find more and more source code in the huge Hacking Team data dump, it becomes more clear what the company’s customers could do …

Microsoft plugs another Windows zero-day with emergency patch

Microsoft has released an emergency update that plugs a critical zero-day vulnerability (CVE-2015-2426) that affects all supported versions of Windows and could allow …

Free tools for detecting Hacking Team malware in your systems

“Worried that you might have been targeted with Hacking Team spyware, but don’t know how to find out for sure? IT security firm Rook Security has released Milano, …

Hacking Team used fake app hosted on Google Play to install its spyware on Android devices

“The massive Hacking Team data leak includes the source code of a fake Android news app and instructions on how to use it, Trend Micro researchers have found. The app, …

Hacking Team spyware survives on target systems with help of UEFI BIOS rootkit

How did Hacking Team make sure that its Remote Control System (RCS) spyware will remain on targets’ computers even if they reinstall their OS, format their hard drives …

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach

After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …

Don't miss

Cybersecurity news