Stylish Magento Card Stealer loads Without Script Tags

Recently one of our analysts, Weston H., found a very interesting credit card stealer in a Magento environment which loads a malicious JavaScript without using any script tags. In this post I will go over how it was found, how to decode it and how it … Continue reading Stylish Magento Card Stealer loads Without Script Tags

Enterprise Security Essentials

The cybersecurity threat landscape has become extremely vast and complex, as has cybersecurity technology. It’s becoming increasingly confusing for organizations to grasp the what, when, where and how of protecting the enterprise. But it doesn’t… Continue reading Enterprise Security Essentials

Understanding Certificate Policies and Practice Statements

Public key infrastructure (PKI) is the sort of technology that most users take for granted. They use it every day in a variety of ways but most don’t even realize it. PKI manages the digital certificates that encrypt sensitive data, secures web browsi… Continue reading Understanding Certificate Policies and Practice Statements

Rapid7 Acquires IntSights to Gain External Threat Intelligence

Rapid7, Inc. this week announced it has acquired IntSights Cyber Intelligence Ltd. for $335 million as part of an effort to provide more visibility into potential external threats as they unfold on the dark web. Richard Perkett, vice president of dete… Continue reading Rapid7 Acquires IntSights to Gain External Threat Intelligence

Improving Efficiency and Results in Threat Prevention with Morphisec Guard

Editor’s Note: This is a guest blog from IT Central Station.
Brian Wagner, the senior network engineer at Wilson County Schools in North Carolina, needed a threat prevention solution that would help improve his overall endpoint protection process … Continue reading Improving Efficiency and Results in Threat Prevention with Morphisec Guard

Defending Against Pervasive Spyware

The revelation that Israeli company NSO Group’s spy software Pegasus was targeting the smartphones of activists, journalists and business executives sent a shockwave through the international press. The spyware successfully infiltrated the mobile devi… Continue reading Defending Against Pervasive Spyware

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

The Cyber Security Buffs: January 2021 Edition

Cyber Security Buffs conducted a webinar on 28th January 2021 to celebrate the occasion of Data Privacy Day. This webinar speculated the upcoming challenges and trends associated with data privacy. It focused on the policies and practices organizations… Continue reading The Cyber Security Buffs: January 2021 Edition

Why Your Security Strategy Needs to Think More About the Browser to stop Ransomware

Cybercriminals are Open for Business and Ransomware is the Daily Special When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: 80% of web application attacks result in credenti… Continue reading Why Your Security Strategy Needs to Think More About the Browser to stop Ransomware

Intel Enables Better Data Security with Crypto Acceleration

Data is essentially the “oil” or “gold” of the Internet Era. Data is crucial for both businesses and individuals—and has significant value for cybercriminals. Data needs to be protected, but that is often easier said than done. Encryption is one of the… Continue reading Intel Enables Better Data Security with Crypto Acceleration