June 13, 2016 Crysis Ransomware Prompts Panic as New Strain Supplants TeslaCrypt, Dethrones Locky 2 min read - Crysis ransomware snuck up on security researchers to become one of the most popular threats attacking organizations with old-school techniques.
June 9, 2016 Warnings About IoT Given to Department of Commerce 2 min read - The Department of Commerce requested enterprises give their thoughts on the Internet of Things, and the result was a lot of warnings about IoT.
June 9, 2016 Worldwide Worry: New National Exposure Index Ranks Most Hackable Countries 2 min read - The National Exposure Index recently ranked the world's most hackable countries, and the results may surprise security professionals.
June 7, 2016 Cerber Ransomware Uses Fast-Changing Hash Signatures to Evade Detection 2 min read - Researchers recently discovered that the Cerber ransomware is generating new hashes every 15 seconds to avoid detection by security tools.
June 7, 2016 Trivial File Transfer Protocol Used in New DDoS Attack 2 min read - A security firm recently reported on how cybercriminals are leveraging the Trivial File Transfer Protocol in distributed denial-of-service attacks.
June 7, 2016 Need for Speed: FastPOS Chooses Swift, Tosses Subtle 2 min read - FastPOS is a point-of-sale malware that favors speed of subtlety — and it could be the next big threat to small or understaffed organizations.
June 6, 2016 New Research Finds 10 Percent of NFS Servers Globally Are at Risk 2 min read - According to a recent study from a security firm, 10 percent of NFS servers globally are at risk for data leakage. Here's what you need to know.
June 6, 2016 New ICS Malware Irongate Channels Stuxnet to Scam SCADA Systems 2 min read - A newly discovered ICS malware called Irongate is eerily similar to the Stuxnet worm in the way it goes after SCADA and industrial control systems.
June 6, 2016 Another SWIFT Attack Speeds Worry About Response — and Responsibility 2 min read - News of another SWIFT attack has the network and banks arguing about incident response — and disagreeing about with whom the responsibility lies.
June 2, 2016 New Zero-Day Exploit Hits the Malware Market 2 min read - Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.