MySQL Databases Targeted in New Ransom Attacks

Fri, 24 Feb 2017 19:21:09 +0000

Thousands of MySQL databases are potential victims to a ransom attack that appears to be an evolution of the MongoDB ransack campaign observed a couple months ago, GuardiCore warns. read more

U.S. Oil and Gas Industry Lagging in Security: Report

Fri, 24 Feb 2017 14:14:04 +0000

The oil and gas industry in the United States is largely unprepared to address cybersecurity risks in operational technology (OT) environments, according to a study commissioned by German engineering giant Siemens. read more

Briton Arrested Over Deutsche Telekom Hacking

Fri, 24 Feb 2017 12:58:52 +0000

A British national has been arrested at a London airport on suspicion of staging a cyber attack on Deutsche Telekom last year that knocked around a million German households offline, officials in both countries said Thursday. read more

D-Link Patches Serious Flaws in DGS-1510 Switches

Fri, 24 Feb 2017 11:42:15 +0000

D-Link has released firmware updates for the company’s DGS-1510 stackable managed switches to address serious vulnerabilities that can be exploited remotely to hijack the devices. read more

CloudFlare Leaked Sensitive Customer Data

Fri, 24 Feb 2017 09:51:35 +0000

CloudFlare has been working around the clock in the past few days to address a critical security problem that led to sensitive customer data getting leaked and cached by search engines. read more

New "Filecoder" macOS Ransomware Surfaces

Fri, 24 Feb 2017 02:05:04 +0000

New Filecoder macOS Ransomware is Poorly Coded, Destructive read more

Poison Ivy RAT Campaign Leverages New Delivery Techniques

Thu, 23 Feb 2017 20:18:10 +0000

A recently observed campaign using the Poison Ivy remote access tool (RAT) against individuals within the Mongolian government uses publicly available techniques that haven’t been observed in previous campaigns, FireEye reports. read more

This What Hackers Think of Your Defenses

Thu, 23 Feb 2017 18:04:53 +0000

Billions of dollars are spent every year on cyber security products; and yet those products continually fail to protect businesses. Thousands of reports analyze breaches and provide reams of data on what happened; but still the picture worsens. A new study takes a different approach; instead of trying to prevent hacking based on what hacking has achieved, it asks real hackers, how do you do it? read more

First SHA-1 Collision Attack Conducted by Google, CWI

Thu, 23 Feb 2017 15:50:13 +0000

Researchers at Google and Centrum Wiskunde & Informatica (CWI) in the Netherlands have managed to conduct the first real world collision attack against SHA-1, creating two documents with different content but identical hashes. read more

These Were the Top Threats Targeting Healthcare Firms in Q4 2016

Thu, 23 Feb 2017 15:46:08 +0000

Healthcare is a consistent target for cybercriminals, with IBM's 2016 Cyber Security Intelligence Index claiming it had become the single most attacked industry. Today FortiGuard Labs has released details on the top 5 methods used to attack healthcare in Q4, 2016. read more

Noise-Canceling Headphones for Your Threat Intel Team

Thu, 23 Feb 2017 15:35:28 +0000

With Transparency and Customized Scoring, You Cancel Out The Noise That’s Distracting Your Threat Intelligence Team read more

Understanding and Combating the Evolving Attack Chain

Thu, 23 Feb 2017 14:46:15 +0000

Adversaries continue to find new ways to operate, using varied techniques to accomplish their mission. And, unless you remain informed about these changes, it’s hard to defend against these evolving threats. read more

Code Execution Flaw Affected Linux Kernel Since 2005

Thu, 23 Feb 2017 13:32:09 +0000

A researcher has discovered a serious locally exploitable vulnerability that appears to have been around in the Linux kernel for more than 11 years. The flaw has been addressed in the kernel and Linux distributions are working on releasing patches. read more

Hard Drive LED Allows Data Theft From Air-Gapped PCs

Thu, 23 Feb 2017 11:20:24 +0000

Researchers at Ben-Gurion University of the Negev in Israel have disclosed yet another method that can be used to exfiltrate data from air-gapped computers, and this time it involves the activity LED of hard disk drives (HDDs). read more