June 1, 2016 No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs 2 min read - A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
June 1, 2016 ‘Perfect’ Data Exfiltration Demonstrated 2 min read - Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
May 31, 2016 Moxa Vulnerabilities Surge in ICS Devices 2 min read - A security researcher recently identified three Moxa vulnerabilities that could put industrial control systems at risk if not addressed.
May 31, 2016 Faster Searches, Less Space With QRadar Security Intelligence 2 min read - QRadar Security Intelligence now offers faster data searches for its users in addition to a host of other improvements and new features.
May 30, 2016 Sandjacking: New iOS Threat Lets Attackers Out of the Box 2 min read - A newly discovered iOS threat called sandjacking could affect any user or app if cybercriminals gain physical access to a mobile device.
May 26, 2016 Stuck in the Middle: MitM Attacks Could Stem From Well-Intentioned WPAD Use 2 min read - Enterprises may have had lofty intentions for the use of the WPAD protocol, but the reality is that it could expose them to MitM attacks.
May 26, 2016 Pastejacking: The Clipboard Copy Concern? 2 min read - A new exploit called pastejacking results in victims unwittingly infecting their own machines thanks to malicious code hidden in seemingly normal text.
May 25, 2016 Social Media Compliance a Challenge for Enterprises 2 min read - Social media compliance worried respondents in one recent report, with many saying that it's difficult to enforce corporate policies.
May 24, 2016 SWIFT Taps Users to Fast-Track Cyberfraud Fight 2 min read - Financial network SWIFT is hoping users will help with threat information sharing and collaboration in an effort to curb cyberfraud.
May 24, 2016 New Method for Random Number Generation Devised at UT Austin 2 min read - A breakthrough in random number generation has the potential to result in stronger encryption— and, ultimately, improved cybersecurity.