Please turn on your JavaScript for this page to function normally.
phishing
Phishers’ techniques and behaviours, and what to do if you’ve been phished

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …

Blak Hat USA 2017
Photo gallery: Black Hat USA 2017, part 2

Black Hat USA 2017 is underway at Las Vegas, and here are a few photos from the Business Hall, the Arsenal, and the Innovation City. Featured companies: NTT Security, …

danger
Security vulnerabilities in radiation monitoring devices

IOActive researcher Ruben Santamarta has uncovered a number of cybersecurity vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs), and has presented his …

business
22% of SMBs hit by ransomware had to cease business operations

More than one-third of small and medium-sized businesses have experienced a ransomware attack in the last year, a new Malwarebytes report claims, and 22 percent of these …

Bitcoin
Russian arrested, indicted for laundering funds from Mt. Gox hack

Alexander Vinnik, a Russian man arrested on Tuesday in Greece, is allegedly the operator of digital currency exchange BTC-e, through which funds from the Mt. Gox bitcoin …

Android malware
Lippizan: Sophisticated, targeted spyware on Google Play

Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed …

hidden attacker
An Internet-connected fish tank let hackers into a casino’s network

A high-tech, internet-connected fish tank in a North American casino has been used to exfiltrate data from the company’s network. Smart drawing pads used in an …

measure
Most companies fail to measure cybersecurity effectiveness

Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …

Employees working while on holiday open orgs to security risks

Many workers will feel the need to check-up on work emails while they are away from the office and enjoying a well-earned vacation. Unfortunately, by doing that, they can open …

Cloud
Self-service perimeter security for the hybrid cloud

Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service …

bug bounties
Microsoft offers rewards for Windows bugs

Microsoft is asking researchers to look for bugs inside the latest Windows 10 version (Insider Preview slow ring). Remote code execution bugs can net finders up to $15,000, …

artificial intelligence
Defensive AI system implements strategies from the best analysts

Champion Technology Company, developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools