Twitter | Search | |
The latest cybersecurity news, tips and features from the reporters and editors of . Security threats, data breaches, research and more.
Tweets 3h
, new malware infecting SOHO network routers and NAS devices, gets sunk as the seizes and sinkholes the through its backup C&C domain; reports as many as 500k devices in 54 countries infected. By
Reply Retweet Like 9h
An increase in DeOS attacks has been reported just as 's 2017 Midyear Report predicted. Learn how these attacks target off-site backups with David Geer.
Reply Retweet Like 10h
This week's Risk & Repeat podcast examines Ray Ozzie's 'Clear' proposal to allow law enforcement access to and the questions about and criticism of the plan.
Reply Retweet Like 11h
"One problem with adopting fog computing based subscriber and publisher protocols is that security mechanisms for resource-constrained devices don't exist." -Judith Myerson on alternatives for
Reply Retweet Like 11h
New malware, dubbed by , infected 500,000 devices and triggered action from , which seized and sinkholed the botnet's domain. By
Reply Retweet Like 12h
vulnerabilities impact the physical and of systems and are extremely difficult to detect. Learn how to prevent an attack with .
Reply Retweet Like 13h
An 8-year-old flaw in that permitted an was recently discovered. What is an LDAP injection vulnerability, and how can it be exploited in an attack? By
Reply Retweet Like 14h
The SANS Internet Storm Center discovered a DDE attack to be spreading . Learn what a is and how to mitigate it with expert .
Reply Retweet Like 15h
With the development of and anti-malware tools comes the evolution of that mimics : . Learn more with
Reply Retweet Like 16h
Expert explains how take advantage of weaknesses in
Reply Retweet Like 16h
New research from shows the likelihood of new Iranian cyberattacks from following the U.S.'s exit from the Iran . By
Reply Retweet Like 17h
" is a collection of scripts and that is posted on a compromised website..." - on 's discovery of spreading via a
Reply Retweet Like 18h
Find out more about the uncovered in targeting North Korean defectors. By
Reply Retweet Like 20h
A look at the key requirements and how to meet them
Reply Retweet Like 21h
Researchers uncovered a new variant of the , the , which targets vulnerable devices and uses multiple existing exploits. By
Reply Retweet Like May 23
Researchers discovered the , which is a variant that uses multiple exploits to target vulnerable devices, including Netgear routers and CCTV video cameras. By
Reply Retweet Like May 23
There's been some debate over whether and are true vulnerabilities. Expert Michael Cobb of discusses what qualifies as a vulnerability and if these two make the cut.
Reply Retweet Like May 23
Meeting the most important requirements is a great first step to compliance with the new regulation. Expert Steve Weil outlines how to get started on .
Reply Retweet Like May 23
New scare as speculative store bypass revealed.
Reply Retweet Like May 23
A rising threat to enterprises is a , according to new research. Expert Ed Moyle of explains what cloud backdoors are and what mitigation options are available.
Reply Retweet Like