
Qualys at Black Hat USA 2017: Best practices and case study presentations
There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and …

Surprisingly stealthy botnet has been targeting users for years
ESET researchers have unearthed a botnet of some 500,000 infected machines engaged mostly in ad-related fraud by using malicious Chrome extensions, but also Facebook fraud and …

Companies unprepared to measure incident response
Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …

New infosec products of the week: July 21, 2017
Awake Security unveils advanced security analytics solution Awake’s advanced security analytics provide security teams the insights needed to understand the scope and impact …

Destruction of Service attacks could shut down organizations for good
The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of …

Every organization is only one click away from a potential compromise
Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for …

Dark web Hansa Market shut down after being run for a month by law enforcement
Just a few short weeks after dark web market Alpha Bay was shut down, Hansa Market is now also shuttered. After Alpha Bay’s shutdown, many users flocked to Hansa Market, …

Apple patches critical Broadpwn vulnerability in its various OSes
Apple has released security updates for iOS, macOS (Sierra, El Capitan, and Yosemite), Safari, iCloud, iTunes, watchOS and tvOS. As per usual, the same fixed Webkit flaws …

Creating the security operations center of the future with Siemplify
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …

Hacker grabs $30 million in ether through Parity multisig wallet flaw
Another day, another cryptocurrency heist: this time, the attacker has stolen some $30 million in ether (ETH – value token of the Ethereum blockchain) from a number of …

Assessing the habits and tactics of organized credit card fraud gangs
By analyzing hundreds of criminal forums, Digital Shadows discovered a new trend in the form of remote learning ‘schools’. Available to Russian speakers only, these six-week …

How healthcare IT decision makers approach IoT security
More than 90% of healthcare IT networks have IoT devices connected to them. Over 70% of IT departments believe that the traditional security solutions used to secure laptops …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems