North Korea's BeagleBoyz cybercriminals have launched an automated teller machine (ATM) cash-out scheme, known as FASTCash 2.0. Cyber experts from the U.S. government have detected the cyber activity over the past five years that led to nearly $2B loss to financial institutions around the world.
The Federal Trade Commission (FTC) has released a new video to help keep your small business safe from fraud. This is another video in a series of videos from the FTC Protecting Small Businesses playlist.
The Department of Homeland Security (DHS) has reissued a National Terrorism Advisory System (NTAS) bulletin after a lethal U.S. strike killed Iranian IRGC-Quds Force commander Qassem Soleimani on January 2, 2020 while Soleimani was in Iraq.
The National Institute of Standards and Technology (NIST) has issued new Security-Focused Configuration Management of Information Systems guidelines (SP 800-128).
Security experts from Kaspersky have discovered 37 vulnerabilities in four VNC implementations, some that have gone undetected since 1999.
Researchers at Microsoft have revealed details on a new fileless info-stealing campaign that uses Astaroth malware.
Security researchers have discovered nearly 50,000 misconfigured SAP systems may be vulnerable to exploits called "10KBlaze" that could lead to the full compromise of SAP applications.
The Center for Internet Security (CIS) has released its new version 7.1 of the top 20 Critical Security Controls. The updated version includes new Implementation Groups designed to identify relevant CIS controls that are reasonable for an organization with a similar risk profile and available cybersecurity resources.
Microsoft has seen a rise in recent cyberattack activity against European think tanks and non-profit organizations. The warning comes as European leaders warn attacks will continue across Europe in 2019.
As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don't have a chance without effective threat communication between the public and private sectors.