Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.

The post Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet appeared first on Security Intelligence.

Continue reading Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

The Weaponization of IoT: Rise of the Thingbots

The IBM X-Force team tracked the weaponization of IoT devices and found that the threat of so-called thingbots increased dramatically in 2016.

The post The Weaponization of IoT: Rise of the Thingbots appeared first on Security Intelligence.

Continue reading The Weaponization of IoT: Rise of the Thingbots

The Weaponization of IoT: Rise of the Thingbots

The IBM X-Force team tracked the weaponization of IoT devices and found that the threat of so-called thingbots increased dramatically in 2016.

The post The Weaponization of IoT: Rise of the Thingbots appeared first on Security Intelligence.

Continue reading The Weaponization of IoT: Rise of the Thingbots

Mirai Evolving: New Attack Reveals Use of Port 7547

Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.

The post Mirai Evolving: New Attack Reveals Use of Port 7547 appeared first on Security Intelligence.

Continue reading Mirai Evolving: New Attack Reveals Use of Port 7547

Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities

Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.

The post Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities appeared first on Security Intelligence.

Continue reading Want Fries With Your EXTRABACON or EPICBANANA? Cisco Addresses Two New Vulnerabilities

The Threat From Weaponized IoT Devices: It’s Bigger Than You Think!

Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?

The post The Threat From Weaponized IoT Devices: It’s Bigger Than You Think! appeared first on Security Intelligence.

Continue reading The Threat From Weaponized IoT Devices: It’s Bigger Than You Think!

Account Takeovers: They Can Happen to Anyone

Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.

The post Account Takeovers: They Can Happen to Anyone appeared first on Security Intelligence.

Continue reading Account Takeovers: They Can Happen to Anyone

Account Takeovers: They Can Happen to Anyone

Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.

The post Account Takeovers: They Can Happen to Anyone appeared first on Security Intelligence.

Continue reading Account Takeovers: They Can Happen to Anyone

Know Your Enemy: Understanding the Motivation Behind Cyberattacks

Understanding the motivation behind cyberattacks — and knowing who could be after your organization — can help you reduce your security risk.

The post Know Your Enemy: Understanding the Motivation Behind Cyberattacks appeared first on Security Intelligence.

Continue reading Know Your Enemy: Understanding the Motivation Behind Cyberattacks