Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Could critical infrastructure attacks be making a comeback? Or did these invisible threats never leave in the first place? Extensive research reveals that as many as four threat actors many have been involved in creating Stuxnet, the sophisticated… Continue reading Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

IoT Adopters Still Concerned about Deployment and Security in Their Ecosystem

Private users are not the only ones excited about IoT technology and gadgets in everyday activity the countless growth opportunities in the area. A number of companies, organizations and even public institutions have turned to connected devices to… Continue reading IoT Adopters Still Concerned about Deployment and Security in Their Ecosystem

Ransomware Takes Weather Channel Live Broadcast Offline

The FBI is investigating a ransomware attack that shut down the Weather Channel’s program for an hour on Thursday, according to The Wall Street Journal. The early morning live broadcast was interrupted for some 90 minutes, forcing the c… Continue reading Ransomware Takes Weather Channel Live Broadcast Offline

Hacker Exposes Confidential Files, Correspondence from Mexican Embassy in Guatemala

After expressing anger that his bug bounty efforts were completely ignored by Mexican officials, a hackers stole and leaked online almost 5,000 confidential documents from the Mexican embassy in Guatemala, writes TechCrunch. The data trove contained cr… Continue reading Hacker Exposes Confidential Files, Correspondence from Mexican Embassy in Guatemala

AI and Automation Seen as Silver Bullet in Overcoming Cybersecurity Skill Gap, Survey Finds

There’s been a lot of focus lately on the best ways to safeguard corporate networks and fend off targeted attacks, and on total cost of ownership. But CISOs worldwide are struggling with an even worse problem that greatly affects their compa… Continue reading AI and Automation Seen as Silver Bullet in Overcoming Cybersecurity Skill Gap, Survey Finds

DHS, FBI Alert: North Korean Backdoor Trojan HOPLIGHT Detected in the Wild, Linked to Lazarus

HOPLIGHT, a critical backdoor Trojan linked to North Korean APT group Lazarus, has been found in the wild, warn the FBI and the Department of Homeland Security in a new malware analysis report.
The post DHS, FBI Alert: North Korean Backdoor Trojan… Continue reading DHS, FBI Alert: North Korean Backdoor Trojan HOPLIGHT Detected in the Wild, Linked to Lazarus

US Senate to End Deceptive Practices and Dark Patterns on Online Platforms

A bipartisan Act proposed by US Senators Mark Warner (D-VA) and Deb Fischer (R-NE) would counter immoral data collection methods by large online platforms, forbidding “deceptive practices” and “dark patterns” that manipulate use… Continue reading US Senate to End Deceptive Practices and Dark Patterns on Online Platforms

Card-Scraping Malware Compromised AeroGrow Customer Payment Data

Ecommerce company AeroGrow International is the latest high-profile breach after its buy page was infected with credit card scraping malware for more than four months, AeroGrow announced in a letter to its customers and to the California Office of the … Continue reading Card-Scraping Malware Compromised AeroGrow Customer Payment Data

Georgia Tech Suffers Second Data Breach, Exposing Data of 1.3 Million People

A vulnerable web app may have compromised the personal information of 1.3 million students, alumni and employees at Georgia Institute of Technology, the institution announced on Wednesday. The data breach was detected in March, but it is believed to ha… Continue reading Georgia Tech Suffers Second Data Breach, Exposing Data of 1.3 Million People

CISOs Latest Dilemma: How to Make the Most Out of Your Endpoint Security Solutions with Understaffed Teams

While digital transformation and the e-commerce bubble in late ’90s have reshaped the way companies do business, increasingly sophisticated cyber-attacks call for immediate and sometimes overly complex defenses. Security tool vendors have been mor… Continue reading CISOs Latest Dilemma: How to Make the Most Out of Your Endpoint Security Solutions with Understaffed Teams