August 28, 2017 Insecure Apple Authorization API Still Used 2 min read - An older MacOS API is still being used by many developers, despite risks. While a new API has been released, it isn't considered to be a good replacement.
August 28, 2017 Insider Threats Account for Nearly 75 Percent of Security Breach Incidents 2 min read - Several recent studies confirmed that a security breach is often caused by an insider threat, including rogue employees or human error.
August 25, 2017 Threat Actors Deliver Cryptocurrency Miners Via Neptune Exploit Kit 2 min read - Threat actors are reviving exploit kits to deliver cryptocurrency miners through malvertising campaigns. The Neptune exploit kit mines for Monero.
August 24, 2017 Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn 2 min read - Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
August 24, 2017 ROPEMAKER Exploit Could Allow Fraudsters to Alter Emails Post-Delivery 2 min read - A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
August 22, 2017 Is Antivirus Protection Still Relevant? 2 min read - A survey of Black Hat attendees showed that many security experts doubt the ability of antivirus protection products to detect ransomware.
August 22, 2017 Pulse Wave Techniques Allow Cybercriminals to Quickly Ramp Up DDoS Attacks 2 min read - The traditional slow crescendo of malicious traffic in DDoS attacks is being replaced by a technique that hits organizations in multiple places at once.
August 22, 2017 CovertBand Hijacks Smart Devices for Surveillance Purposes Using Sound Waves 2 min read - Researchers have created a tool that emits sound waves in smart devices to track human movements. This ability opens up new possibilities for spyware.
August 22, 2017 Processor Energy Management Systems Vulnerable to CLKscrew Attacks 2 min read - Energy management systems are prone to remote attacks because of a lack of focus on security, researchers from Columbia University found.
August 17, 2017 IBM and Check Point: Breaking New Ground in Collaborative Defense 3 min read - IBM and Check Point are pairing up to provide increased security protections, which include automating endpoint detection and communication.