Please turn on your JavaScript for this page to function normally.
linux tux
Versatile Linux backdoor acts as downloader, spyware

Another Linux Trojan has been discovered by researchers, and this one is pretty versatile: it opens a backdoor into the infected device, can download and run additional …

Fortinet
SSH backdoor found in more Fortinet devices, exploit attempts spotted in the wild

In case you missed it, Fortinet announced last week that the recently discovered FortiOS SSH backdoor – or, as they call it, “a management authentication …

industry
Threats to the critical information infrastructure on the rise

Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …

Magento
Magento plugs XSS holes that can lead to e-store hijacking, patch immediately!

Last week, Magento released a very important bundle of patches for their eponymous e-commerce platform that should be implemented as soon as possible. The bundle plugs a …

rise
Data security advances on the corporate agenda

Glasswall Solutions issued its top five predictions for 2016. “We believe the next 12 months will see some of the most significant developments in the history of cyber …

corporate
The corporate risk factor disclosure landscape

Corporate risks disclosed by public companies in SEC filings often are generic and do not provide investors with clear, concise and insightful information that is …

Week in review: Rise of automation, Google hacking, and Symantec reseller turns to scamming

Here’s an overview of some of last week’s most interesting news, reviews and articles: “Deliberately hidden” backdoor found on US government’s …

labyrinth
“Deliberately hidden” backdoor found on US government’s comms system

Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …

abstract
Unknown attackers are infecting home routers via dating sites

Damballa researchers have spotted an active campaign aimed at infecting as many home routers possible with a worm. A variant of the TheMoon worm, it works by taking advantage …

password
Why we need a reality check on passwords

Given all the recent and historical news on data breaches of personal e-mail accounts, social media accounts and even phone account passwords, it is every wonder therefore …

money
Organizations are spending ineffectively to prevent data breaches

A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Cloud
Security to become primary reason government agencies move to the cloud

Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools