Security News > 2017 > July

TrickBot Trojan Gets Worm-Like Infection Powers (Security Week)
2017-07-28 15:54

A newly observed version of the TrickBot banking Trojan includes a worm-like malware propagation module that allows it to spread locally via Server Message Block (SMB), Flashpoint security...

How to protect the power grid from low-budget cyberattacks (Help Net Security)
2017-07-28 15:20

Cyberattacks against power grids and other critical infrastructure systems have long been considered a threat limited to nation-states due to the sophistication and resources necessary to mount...

U.S Indicts Russian Man Over Money Laundering Through Bitcoin Exchange (Security Week)
2017-07-28 14:36

95% of Tracked Ransoms Were Cashed Out via BTC-e, a Digital Currency Exchange The Accused Alexander Vinnik Operated read more

Threat prevention for protecting production environments (Help Net Security)
2017-07-28 14:33

Capsule8 launched the beta version of Capsule8 Protect, a threat prevention and response platform purpose-built for cloud-native environments. Organizations are rapidly shifting toward...

VMware API Allows Limited vSphere Users to Access Guest OS (Security Week)
2017-07-28 14:30

LAS VEGAS - BLACK HAT USA - Researchers discovered that a VMware API can be abused by vSphere users with limited privileges to access the guest operating system without authentication. VMware has...

Phishers’ techniques and behaviours, and what to do if you’ve been phished (Help Net Security)
2017-07-28 14:03

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva researchers went undercover...

British Hacker Convicted in Germany of Major Cyber Attack (Security Week)
2017-07-28 13:16

A British man was handed a suspended jail sentence by a German court Friday for a massive cyber attack against Deutsche Telekom last year. read more

WikiLeaks Details Mac OS X Hacking Tools Used by CIA (Security Week)
2017-07-28 12:13

The latest round of documents published by WikiLeaks as part of a leak dubbed by the organization “Vault 7” describes several tools allegedly used by the U.S. Central Intelligence Agency (CIA) to...

CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
2017-07-28 11:41

Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...

Shorting-For-Profit Viable Business Model For Security Community (Threatpost)
2017-07-28 11:20

MedSec CEO Justine Bone said shorting companies to profit off discovered vulnerabilities is a viable business model for the security community.