January 12, 2017 New PoC Exploit Weaponizes Security Research 2 min read - The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.
CISO January 11, 2017 Predicting the Top Three Concerns for CISOs in 2017 3 min read - The top concerns for CISOs in 2017 involve aligning with business goals, addressing the IT skills gap and the increasing sophistication of cyberthreats.
January 10, 2017 Botnet Phones Home Via Ghost Host 2 min read - Researchers disclosed a new method known as "ghost host," in which malware authors input false names in the HTTP host fields of a botnet's communications.
January 10, 2017 Missing Security Plus Malicious Attacks Equals Massive MongoDB Servers Breach 2 min read - Cybercriminals leveraged poor password hygiene among users and administrators to compromise nearly 30,000 databases on MongoDB servers.
Malware January 10, 2017 Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil 7 min read - IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.
Intelligence & Analytics January 9, 2017 The Four Leading Security Threats of 2017 2 min read - Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.
Intelligence & Analytics January 2, 2017 2017: A New Year’s Security Resolution 3 min read - IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.
December 28, 2016 Burrowing Bad? Ransomworms Deepen Crypto-Ransomware Threats in 2017 2 min read - What's worse than ransomware? Ransomworms. Evolving crypto-ransomware techniques could wreak havoc on the IT security landscape in 2017.
Intelligence & Analytics December 23, 2016 Episode 004: The Twelve Days of Christmas 2 min read - The Every App team broke out in song to recap a year's worth of cybersecurity challenges in the latest edition of the "In Security" web comic.
December 22, 2016 Revised Mobile Banking Trojans Faketoken and Tordow 2.0 Threaten Customer Information and Business Integrity 2 min read - Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.