The Executive Guide to Demystify Cybersecurity

The Executive Guide to Demystify Cybersecurity

WHAT DO BANKS AND CYBERSECURITY HAVE IN COMMON? EVERYTHING The world we live in can be a dangerous place, both physically and digitally. Our growing reliance on the Internet, technology and digitalization ...
Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

When breaking the law isn’t a barrier, there’s always a way to make a quick buck. We see it every day, and this time from an Indonesian cybercrime campaign infecting vulnerable websites ...

Zero to account takeover: How I ‘Impersonated’ Someone Else Using Auth0

There’s a fine line between an unintended use and a bug; this was my conclusion after taking a look at Auth0, an identity-as-a-service offering with 2000 enterprise customers – more or less ...
New research shows 75% of ‘open’ Redis servers infected

New research shows 75% of ‘open’ Redis servers infected

Since our initial report on the RedisWannaMine attack that propagates through open Redis and Windows servers, we’ve been hearing about more and more attacks on Redis servers. Redis is a great tool, ...
Tariffs Expected to Increase Hacks

New Tariffs Expected to Increase Hacks on Intellectual Property

Could a trade war create a spike in hacking attempts? That’s the concern of cybersecurity professionals, who believe that the proposed new tariffs instituted by the United States will lead to an ...
Security Boulevard
Healthcare IT Leaders Most Concerned about Ransomware and Insider Threats: Survey

Healthcare IT Leaders Most Concerned about Ransomware and Insider Threats: Survey

Just over a year ago, the WannaCry ransomware attack wreaked havoc on the UK National Health Service (NHS), ultimately disrupting a third of its facilities and causing a rash of canceled appointments ...

The FBI’s 10 Most-Wanted Black-Hat Hackers – #5, #4 and #3

This week in Tripwire’s countdown of the FBI’s 10 most-wanted black-hat hackers, we name three hackers bound together in digital crime: Wen Xinyu, Huang Zhenyu and Sun Kailiang. The suspects made headlines ...
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

New DDoS Attack Method Demands a Fresh Approach to Amplification Assault Mitigation

Amplification attack vectors are some of the most commonly used tools in the DDoS attacker’s arsenal. In the last quarter of 2017, we saw NTP amplification employed in roughly 33 percent of ...

The AI’ker’s Guide to the (cybersecurity) Galaxy

As a security veteran, I find myself from time to time having to explain to newbies the importance of adopting a ‘hacker’s way of thinking’, and the difference between hacker’s thinking and ...
Loading...