Seagate acknowledges NAS 0-day, announces patch
After security researcher OJ Reeves publicly revealed the existence of a remote code execution zero-day flaw affecting Seagate’s Business Storage 2-Bay NAS line of …
UK: 57 arrested for cyber crime, including US DoD hacker
Last week was a busy one for UK law enforcement, as agents from the National Cyber Crime Unit (NCCU) of the National Crime Agency (NCA) spearheaded a nationwide cyber crime …
Tired of paying for automated scanning and still seeing your website hacked?
Try ImmuniWeb now. ImmuniWeb combines automated assessment with manual penetration testing performed by experienced security experts. Recently reviewed in Help Net Security, …
Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, interviews and articles: A threat assessment of 7 million iOS and Android apps Android malware is …
The C99Shell PHP backdoor lives on
The C99Shell PHP backdoor, originally spotted in 2007, is still around, and is still a danger to both web server operators and end-users. After getting a tip from a designer …
Fake “Flash Player Pro” update delivers password-stealing Trojan
Researchers are warning about a new malware delivery campaign aimed at spreading Fareit, a password-stealing Trojan that can also download additional malware. This campaign is …
Windows vulnerable to FREAK attacks after all
Microsoft has released a security advisory on Thursday, confirming that all supported releases of Microsoft Windows are vulnerable to the recently documented FREAK (Factoring …
Cryptowall makes a comeback via malicious help files
A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware. Cryptowall is an advanced version of Cryptolocker, …
Expert tips to address third party security risks
Risks to sensitive data have never been greater. With the rise in cyber attacks and data breaches, outsourcing to third parties can present an exponential threat to …
Adobe launches bug disclosure program, skimps on bounties
Adobe has launched its own web application vulnerability disclosure program. Set up through the bug bounty platform HackerOne, the program is limited to vulnerabilities …
Top priorities for internal audit professionals
Internal audit professionals are making strides in meeting cybersecurity and data privacy standards, according to Protiviti. Much work remains, with many of the surveyed …
SanDisk InfiniFlash storage targets Big Data workloads
SanDisk unveiled an all-flash storage platform that creates a new category for the IT industry, termed by IDC as Big Data Flash. Built using open source software, …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC