Linux systems infiltrated and controlled in a DDoS botnet
Akamai Technologies is alerting enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to …
iCloud wasn’t hacked, says Apple
Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …
Cybercriminals love PayPal, financial phishing on the rise
Kaspersky Lab’s experts reported a substantial increase in the amount of financial phishing in spam. There was a 7.9 percentage points increase in the amount of scam …
Free security software identifies cloud vulnerabilities
Whether responding to customer orders or requesting partner data, the biggest cloud security concern for the enterprise is the direct communication between applications. To …
Namecheap accounts brute-forced by CyberVor gang?
California-based domain registrar and web hosting firm Namecheap has been targeted by hackers, the company’s VP of hosting Matt Russell warned on Monday, and said that …
Tox: Open-source, P2P Skype alternative
If you like the convenience of Skype, but you are worried about government surveillance and don’t trust Microsoft to keep you safe against it, Tox might be just the …
New BlackPOS variant masquerades as AV service
Before the Backoff point-of-sale malware received deserved attention, the main player in the PoS malware field was BlackPOS (or Kaptoxa), the memory-scraping malware that was …
Beware of scams following the celebrity nude photo news
As the FBI confirmed that they are investigating the leaking of nude photographs (some real, some fake) of a hundred female celebrities, the hunt for the person(s?) behind it …
160,000 new malware samples appear each day
Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according …
Expert international cybercrime taskforce tackles online crime
Hosted at the European Cybercrime Centre (EC3) at Europol, the Joint Cybercrime Action Taskforce (J-CAT), which is being piloted for six months, will coordinate international …
70% of IT pros experience weekly phishing attacks
69 percent of IT professionals experience phishing attacks at least once a week, with customer data cited most often as the type of data attacked, followed by financial …
eBook: BYOD Policy Roadmap
Every business needs a clearly articulated position on BYOD, even if it chooses not to allow for it. What’s your position? Do you even have one? If you’re …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military