Cybercrime attack targets, victims, motivations and methods
Trustwave experts gathered the data from 691 breach investigations (a 54 percent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned …
iBanking Android malware disguised as legitimate apps
On underground cybercrime markets, iBanking is a well-known piece of malware, and one of the most expensive ones, too. “iBanking often masquerades as legitimate social …
Some industrial systems still vulnerable to Heartbleed
The danger from Heartbleed has passed for most Internet users, but operators of Industrial Control Systems (ICS) are not that lucky. The US ICS CERT has issued on Tuesday an …
Insider threat and privileged user abuse
Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …
Facebook offers free browser-based malware scanner
People share via social media more than any other channel. But with social media exploits of personal and corporate accounts frequently making headlines, it’s time for …
Legacy cybersecurity products failed to protect 97% of organizations
A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to March 2014. Offering a unique glimpse …
Most compliance officers play little role in cyber security
Seventy-five percent of compliance officers are not involved in managing cyber security risk according to a report from Kroll and Compliance Week. In a survey of senior-level …
Free privacy and security scans with McAfee Mobile Security
McAfee announced the latest version of McAfee Mobile Security that now enables consumers to run free privacy and security scans. These scans allow users to identify apps that …
China reacts to military hackers’ indictment, accuses US of hypocrisy
Yesterday, for the first time ever, the US Justice Department filed criminal charges against known state actors for hacking, as it accused five Chinese military hackers of …
Angler exploit kit starts wielding Silverlight exploits
“Silverlight exploits are the drive-by flavor of the month,” claim Cisco researchers. “Exploit Kit owners are adding Silverlight to their update releases, …
Fascinating MiniDuke backdoor hits again
MiniDuke – the extremely small and highly customized Asembler-based backdoor used in the past to target mostly government entities and institutions around the world …
Proofpoint acquires NetCitadel
Proofpoint has acquired NetCitadel, a pioneer in the field of automated security incident response. Under the terms of the agreement, Proofpoint paid approximately $24.0 …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down