
Researchers showcase automated cyber threat anticipation system
A group of researchers is trying to develop an automatic early warning system that should help defenders take preventative action before specific cyber attacks start …

Google booted 100,000 malicious developers from Google Play
New malware and unwanted apps are discovered on Google Play nearly every day – or so it seems. According to Google’s statistics, in 2017 the company has taken down …

AutoSploit: Automated mass exploitation of remote hosts using Shodan and Metasploit
A “cyber security enthusiast” that goes by VectorSEC on Twitter has published AutoSploit, a Python-based tool that takes advantage of Shodan and Metasploit modules …

BEC scams surge, cybercriminals target nearly all organizations
96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack …

Innovative organizations build security into their cloud strategy
Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & …

How do your IT complexity challenges compare to those of other CIOs?
A global survey of 800 CIOs conducted by Vanson Bourne reveals that 76% of organizations think IT complexity could soon make it impossible to manage digital performance …

The Ransomware Survival Handbook
When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even backups) as quickly as possible. That can happen in a matter of …

Attackers disrupt business operations through stealthy crypto mining
WannaMine, a Monero-mining worm discovered last October, is increasingly wreaking havoc on corporate computers. Either by slowing down computers or by crashing systems and …

Mozilla plugs critical and easily exploitable flaw in Firefox
Firefox users would do well to upgrade to the browser’s latest release if they want to keep their computers safe from compromise. Released on Monday, Firefox 58.0.1 …

Multiple zero-day vulnerabilities found in ManageEngine products
Digital Defense uncovered multiple, previously undisclosed vulnerabilities within several Zoho ManageEngine products. ManageEngine offers more than 90 tools to help manage IT …

Most top US and EU e-retailers are putting their consumers at risk
A new study by 250ok has revealed that 87.6 percent of the root domains operated by top e-retailers in the United States and European Union are putting their brands and …

Widespread API use heightens cybersecurity risks
A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot …