Please turn on your JavaScript for this page to function normally.
bitcoin
New Cerber ransomware variant steals Bitcoin wallets, passwords

Here’s a new reason to fear ransomware more than ever before: a new variant of Cerber has been modified to steal Bitcoin wallets and passwords before encrypting …

Qualys
Qualys CISO on making everything visibile and secure

In this podcast recorded at Black Hat USA 2017, Mark Butler, CISO at Qualys, talks about his role, streamlining security and compliance solutions, building security into …

Dash
Dash invites researchers to hack their blockchain

Thousands of security researchers will be incentivized to identify critical software vulnerabilities within Dash’s code and present them to the Dash Core Team for remediation. …

abstract
Week in review: MalwareTech arrested, hacking Amazon Echo

Here’s an overview of some of last week’s most interesting news, articles and podcasts: US senators introduce bill to improve IoT security, protect researchers …

woman
What leads women to cybersecurity, and what makes them stay?

Many studies have shown that different perspectives result in a better understanding of problems and, ultimately, in better solutions for everybody. But even though it’s …

Mozilla Send file sharing
Mozilla sets up private, encrypted file sharing service for large files

Mozilla has launched an online service for private sharing of encrypted files between two users. It’s called Send, and it’s meant to ensure users’ shared …

FBI
UK researcher who stopped WannaCry charged with creating and distributing banking Trojan

Marcus Hutchins, the 23-year-old UK researcher who found the kill-switch domain in the WannaCry ransomware code and registered it, preventing the malware to wreak even more …

icosahedral
How to select a suitable incident response program for your organization

All organizations, regardless of how well they think their walls are fortified, will at some point fall victim to an attack. How they respond to the attack could mean the …

box
New infosec products of the week​: August 4, 2017

New Forcepoint CASB behavior analytics help security teams reduce time to action Forcepoint fortified its cloud security portfolio to empower security teams with new …

tunnel
The anatomy of a completely fileless attack

The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to …

Google Chrome biohazard
Another popular Chrome extension hijacked through phishing

Chris Pederick, the creator and maintainer of the Web Developer for Chrome extension, is the latest victim of attackers who hijack popular Chrome add-ons in order to push ads …

lock
Malicious content delivered over SSL/TLS has more than doubled in six months

Threats using SSL encryption are on the rise. An average of 60 percent of the transactions in the Zscaler cloud have been delivered over SSL/TLS. Researchers also found that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools