
Linux/IRCTelnet creates new, powerful IoT DDoS botnet
Linux/IRCTelnet (new Aidra), a new piece of Linux malware targeting IoT devices and turning them into DDoS-capable bots, has been spotted and analyzed by one of the …

Latest Windows zero-day exploited by DNC hackers
Due to Google’s public release of information about an actively exploited Windows zero-day, Microsoft was forced to offer its own view of things and more information …

NullCrew member sentenced to 45 months in prison
A Tennessee man has been sentenced to nearly four years in federal prison for launching cyber attacks on corporations, universities and governmental entities throughout the …

Integrating threat intelligence with existing security technologies
70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. Perceptions about the …

65% of Windows devices still running Windows 7, released in 2009
To analyze the current state of device security, Duo Security analyzed more than two million devices, 63 percent of which were running Microsoft operating systems. Seriously …

Most employees violate policies designed to prevent data breaches
Companies are increasing technology investments to protect against external data breaches, but employees pose a bigger threat than hackers, according to CEB. To mitigate the …

Industry reactions: UK government cyber security strategy
Yesterday, the UK government announced a new £1.9bn cyber security strategy, which includes an increase in automated defences to combat malware and spam emails, investment to …

Google warns of actively exploited Windows zero-day
Google has disclosed to the public the existence of a Windows zero-day vulnerability (CVE-2016-7255) that is being actively exploited in the wild. According to Neel Mehta and …

Services disrupted at three UK hospitals due to virus attack
Computer systems of the Northern Lincolnshire and Goole NHS Foundation Trust have been hit by a “virus”, and the HNS Trust reacted by shutting down the majority of …

Smart machines: Is full automation desirable?
By 2020, smart machines will be a top five investment priority for more than 30 percent of CIOs, according to Gartner. With smart machines moving towards fully autonomous …

Improving business intelligence: The key catalyst is governance
While Business Intelligence (BI) is yielding important benefits for the vast majority of surveyed companies, most feel there is more to come, according to Qlik and Forbes …

The difference between IT security and ICS security
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about the difference between IT …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted