BlueKeep Attacks Have Arrived, Are Initially Underwhelming

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential. Continue reading BlueKeep Attacks Have Arrived, Are Initially Underwhelming

ICS Attackers Set To Inflict More Damage With Evolving Tactics

While it remains difficult to attack critical infrastructure successfully, adversaries aim to use past experience to launch more destructive future attacks, according to analysis. Continue reading ICS Attackers Set To Inflict More Damage With Evolving Tactics

Ransomware, Mobile Malware Attacks to Surge in 2020

Targeted ransomware, mobile malware and other attacks will surge, while companies will adopt AI, better cloud security and cyber insurance to help defend and protect against them. Continue reading Ransomware, Mobile Malware Attacks to Surge in 2020

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Consumers don’t vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ Continue reading ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Survey Finds People are Privacy Hypocrites

A report by HP found that most people admit to looking at others’ computer screens and documents in the workplace while still keeping their own privacy top of mind. Continue reading Survey Finds People are Privacy Hypocrites