Cybersecurity News


New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware

Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.
18 August 2020

Large Orgs Plagued with Bugs, Face Giant Patch Backlogs

Large Orgs Plagued with Bugs, Face Giant Patch Backlogs Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs with every scan.
18 August 2020

Ritz London clients scammed after apparent data breach

Armed with personal data stolen from the hotel's dining reservation system, fraudsters trick guests into handing over their credit card details

The post Ritz London clients scammed after apparent data breach appeared first on WeLiveSecurity

18 August 2020

How to Stay Secure on GitHub

How to Stay Secure on GitHub GitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.
18 August 2020

AWS Cryptojacking Worm Spreads Through the Cloud

AWS Cryptojacking Worm Spreads Through the Cloud The malware harvests AWS credentials and installs Monero cryptominers.
18 August 2020

Why Quality & Security Both Matter in Software

It's time to position quality and security as equals under the metric of software integrity.
18 August 2020

Make a Difference: Serve on the 2021-2022 PCI SSC Board of Advisors


Every two years, PCI Security Standards Council asks its Participating Organizations to elect its next Board of Advisors. In this election by peers, companies have an opportunity to nominate candidates that they believe will best represent the interests of their organization, industry sector or region. As we enter the fall of 2020, it is election season once again and we begin the process of determining who will serve on the 2021-2022 PCI SSC Board of Advisors.

18 August 2020

Ukraine arrests gang who ran 20 crypto-exchanges and laundered money for ransomware gangs

Gang is believed to have laundered more than $42 million in criminal proceeds.
18 August 2020

IcedID Trojan Rebooted with New Evasive Tactics

IcedID Trojan Rebooted with New Evasive Tactics Juniper identifies phishing campaign targeting business customers with malware using password protection, among other techniques, to avoid detection.
18 August 2020

US Army report says many North Korean hackers operate from abroad

US Army says many North Korean hackers are actually located outside the hermit kingdom, in countries like Belarus, China, India, Malaysia, and Russia.
18 August 2020

World's largest cruise line operator discloses ransomware attack

Carnival Corp says it suffered a ransomware attack on Saturday, August 15, and that hackers stole some of its data.
17 August 2020

Firms Still Struggle to Prioritize Security Vulnerabilities

Security debt continues to pile up, with 42% of organizations attributing remediation backlogs to a breach, a new study shows.
17 August 2020

Advent Completes Forescout Purchase

The purchase by a private equity fund was announced in February and completed today.
17 August 2020

Reported Breach Count for H1 2020 Lowest in Five Years

While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.
17 August 2020

Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing

Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.
17 August 2020

‘EmoCrash’ Exploit Stoppered Emotet For 6 Months

‘EmoCrash’ Exploit Stoppered Emotet For 6 Months A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.
17 August 2020

Microsoft's Control Flow Guard comes to Rust and LLVM compilers

Clang and rustc compilers can now compile CFG-enabled Windows binaries.
17 August 2020

REvil Ransomware Hits Jack Daniel's Manufacturer

Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.
17 August 2020

Should I Segment my IoT Devices Onto Their Own Networks?

Should I Segment my IoT Devices Onto Their Own Networks? Understanding the criticality and importance of the device determines the level of segmentation.
17 August 2020

Jack Daniels, Ritz London Face Cyberattacks

Jack Daniels, Ritz London Face Cyberattacks The REvil ransomware and savvy phone scammers have exposed sensitive information.
17 August 2020