Software Vulnerabilities May 20, 2020 Take a Bite Out of Sweyn 4 min read - If you work in the healthcare industry, you may have heard about a family of vulnerabilities called "SweynTooth." But how serious is SweynTooth, and what should hospitals be doing to minimize risk?
May 4, 2020 Vulnerabilities in LMS Plugins Allow Students to Access Records, Edit Data < 1 min read - Security researchers discovered that students could abuse vulnerabilities in certain LMS plugins to access records and edit data.
April 28, 2020 Attack Resources Shared by New LeetHozer Botnet and Moobot Malware 2 min read - Security researchers discovered that the new LeetHozer botnet shares some attack resources with the Moobot malware family.
April 22, 2020 Moobot Leverages Zero-Day Vulnerability to Target Fiber Routers 2 min read - Security researchers observed Moobot and other botnets attempting to exploit a zero-day vulnerability in order to compromise fiber routers. Read on to learn more about Moobot's recent activity.
April 7, 2020 Kinsing Malware Hits Container API Ports With Thousands of Attacks per Day 2 min read - A misconfigured API port led to a months-long campaign in which cybercriminals have been launching daily Kinsing malware attacks that number in the thousands, according to security researchers.
Cloud Security March 24, 2020 Do You Know Your Responsibilities When It Comes to Container Security? 4 min read - Even some of the best cloud service providers (CSPs) won't provide sufficient container security to satisfy your compliance needs.
Fraud Protection March 17, 2020 2020 Tax Fraud Trends: How to Protect Yourself at Home and Work 8 min read - Scammers view tax season as a prime recruiting season for victims. Here are the most prominent tax fraud trends in 2020 and how to protect your identity and business from risks.
Software Vulnerabilities March 16, 2020 Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers 6 min read - It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.
March 10, 2020 Threat Actors Launch Attacks Based on Exchange Control Panel Vulnerability 2 min read - Threat groups are exploiting a vulnerability in the Exchange Control Panel (ECP) just weeks after Microsoft issued a patch, security researchers have discovered.
CISO March 10, 2020 In 2020, IoT Security Must Be Part of Your Threat Management Strategy 2 min read - From a threat management perspective, there is no logic in securing IT equipment while ignoring the IoT devices active in the same environment. Organizations must consider IoT devices as well.