
Week in review: Mac malware-as-a-Service, CIA hacking routers, top tech for infosec
Here’s an overview of some of last week’s most interesting news and articles: End-to-end email encryption with no central point of attack A seamless, easy-to-use, …

Cyber extortionists target North American companies
A group of financially motivated hackers is targeting networks and systems of North American companies, threatening to leak the stolen information and cripple the company by …

BAE Systems sold cyber-surveillance tools to autocratic regimes
British multinational BAE Systems has sold sophisticated surveillance technology to many repressive governments in the Middle East and Africa, an investigation by BBC Arabic …

How the CIA hacked wireless home routers
For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

New infosec products of the week: June 16, 2017
Uplevel Systems unveils managed VPN service infrastructure Uplevel Systems has added VPN capabilities to its hybrid managed service platform to help providers differentiate …

Perception and reality: The role of AI and automated cyber defenses
Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

Most corporate finance leaders expect to change fraud-fighting strategies
Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

US restaurants targeted with fileless malware
Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign …

Whitepaper: Confronting advanced threats as an organization
This whitepaper is no longer available. Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of …

End-to-end email encryption with no central point of attack
A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based …

DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

Fake news services and tools proliferate on online markets
Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread and reach its …
Featured news
Resources
Don't miss
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised
- How CISOs can talk cybersecurity so it makes sense to executives