Police Shut Down Largest DDoS-for-Hire Marketplace

A large marketplace that allowed users to rent distributed denial-of-service (DDoS) infrastructure from hackers has been shut down following a global law enforcement operation led by police agencies from the Netherlands and the UK. Known as webstresser.org, the marketplace had 136,000 registered users and was responsible for around 4 million attacks to date, according to..
Read more

Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2

Developers of the popular Drupal content management system plan to release a critical out-of-band patch April 25 that’s related to the actively exploited Drupalgeddon2 vulnerability fixed late last month. “There will be a security release of Drupal 7.x, 8.4.x, and 8.5.x on April 25th, 2018 between 16:00 – 18:00 UTC,” the Drupal developers said in..
Read more

Your EBusiness and Cybersecurity? How to Stay Safe?

You have started your online business, and it’s going great, which means you can sit back and enjoy the fruits of your labor. Well, not exactly. If your eBusiness is a success, you still have to work on it constantly in order to keep up with the changes, as well as your competition. But, even… The post Your EBusiness and Cybersecurity? How to Stay Safe? appeared first on CCSI.
Read more

Routers Prove to Be an Easy Target for Russian Hackers

You may unknowingly be part of a Russian hacking campaign. No, I’m not talking about election tampering; this is a different, but ongoing, tactic. Hackers are targeting the types of routers and firewalls, including those used in homes and small businesses. The U.S. Computer Emergency Readiness Team (US-CERT) released an unusual joint warning with the..
Read more

The Shared Security Weekly Blaze – Android’s Toxic Hellstew of Vulnerabilities, Facebook’s New Privacy Controls, Russian Router Hacking

This is the Shared Security Weekly Blaze for April 23, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions, Silent Pocket and CISOBox.  This episode was hosted by Tom Eston. Show Transcript This is your Shared Security Weekly Blaze for April 23rd 2018 with your host, Tom Eston. In this week’s episode:
Read more

How to Stop Cryptomining and Cryptojacking Attacks

Cryptomining and cryptojacking attacks are on the rise In the last six months, we’ve seen an escalation in malicious cryptomining and cryptojacking activities. Tesla AWS S3 was hacked to run cryptomining malware. The U.S. Courts official website, UK’s National Health Service (NHS) and Information Commissioner’s Office, and the Australian state governments for Victoria and Queensland..
Read more

Higher Education a Top Target for Cryptomining

You know an internet-based technology is becoming more accepted into the mainstream when cybercriminals make it a target for attacks. We saw it with malware designed specifically for Apple products, and later with smartphone and tablet apps. Last year, we saw internet of things (IoT) devices used to orchestrate a massive DDoS attack. In 2018,..
Read more

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. The post Beware of watering hole attacks! appeared first on Health Security Solutions.
Read more

What is an MSSP?

This short blog should provide a sufficient answer to everyone who has heard the term MSSP, but never knew what the heck it was. In 2018, everything is constantly evolving. Whereas smaller companies historically housed all software on their own hardware housed in their own data center, with its own security and productivity tools: today… The post What is an MSSP? appeared first on CCSI.
Read more

Cisco Strengthens Cloud Security Service

Cisco Systems at RSA Conference 2018 significantly expanded its Advanced Malware Protection (AMP) for Endpoints cloud security service by adding support for machine learning algorithms, analytics and modeling capabilities that collectively serve to thwart spear phishing and other types of cyberattacks launched via email. In addition, Cisco announced it has developed a new engine that..
Read more
Page 1 of 2712345...1020...Last »