CCleaner application backdoor
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
CCleaner application backdoor Read More »
Security researchers discovered a supply chain threat used to distribute a backdoor and multi-stage malware via legitimate software package CCleaner.
CCleaner application backdoor Read More »
Checkpoint has discovered a new attack method subbed “Bashware” that can allow hackers to bypass common security solutions with any known malware. The Bashware technique takes advantage of a new Windows 10 supported feature “Subsystem for Linux (WSL).” The new WSL feature allows Windows users to use popular bash terminal and run native Linux
Bashware cyber threat Read More »
Security researchers have disclosed multiple Bluetooth vulnerabilities that could threaten billions of smartphones from Android and Apple and millions of Internet of Things (IoT) devices, such as smart TVs, printers and others that may use the Bluetooth wireless protocol.
BlueBorne: Bluetooth cyber attacks Read More »
In case you missed it, the National Institute of Standards and Technologies (NIST) published a new guideline “An Introduction to Information Security” for individuals looking to get a better understanding of introductory information security best practices.
Introduction to Information Security: 11 Key Takeaways Read More »
A massive data breach of credit equity firm Equifax has potentially impacted 143 million customers.
Equifax suffers massive data breach Read More »
A sophisticated attack group known as Dragonfly is targeting the energy sector in Europe and North America in a new wave of cyber attacks with objective to severely disrupt operations.
Dragonfly cyber campaign Read More »
These 10 critical yet practical data security controls can help your small or mid-sized business safeguard sensitive data and be better prepared for the General Data Protection Regulation (GDPR), soon to become effective May 25th, 2018. As we highlighted in our last article, GDPR: 10 Key Highlights From The New EU Regulations, we included some important takeaways
10 Critical Security Controls For GDPR Readiness Read More »
Nearly four million Time Warner Cable (TWC) customer records were left exposed online via a third party data leak.
Time Warner Cable customer data leak Read More »
The Zscaler ThreatLabZ research team has spotted a new remote access Trojan (RAT) family called Cobian RAT that contains a backdoor module, which retrieves command and control (C&C) information from a predetermined URL that is controlled by the original author.
Cobian RAT backdoor threat Read More »
Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T’s U-verse service.
Arris modem vulnerabilities Read More »