Security News > 2018 > February

Cryptojacking Attack Found on Los Angeles Times Website
2018-02-22 20:11

A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage that was secretly using visitors’ devices to mine cryptocurrency.

Trend Micro fixes serious vulnerabilities in Email Encryption Gateway
2018-02-22 19:41

Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a remote unauthenticated...

Fraud Campaign Targets Accounts Payable Contacts at Fortune 500 Firms
2018-02-22 19:08

A new business email compromise (BEC) campaign is targeting accounts payable personnel at Fortune 500 companies in an attempt to trick victims into initiating fraudulent wire transactions to...

Mirai Variant Sets Up Proxy Servers on Compromised Devices
2018-02-22 18:18

A newly observed variant of the infamous Mirai botnet is capable of setting up proxy servers on the infected Internet of Things (IoT) devices, Fortinet warns. read more

WhatsApp Co-founder Invests $50 Million in Signal
2018-02-22 17:15

Open Whisper Systems, the organization behind the privacy-focused messaging app Signal, announced on Wednesday the launch of the Signal Foundation, with an initial investment of $50 million from...

Do Business Leaders Listen to Their Own Security Professionals?
2018-02-22 15:36

Survey Shows a Disconnect Between Business Leaders and Security Professionals A new research report published this week claims, "A disconnect about cybersecurity is causing tension among leaders...

Cisco Patches Critical Flaws in UCDM, ESC Products
2018-02-22 15:29

Updates released by Cisco for its Unified Communications Domain Manager (UCDM) and Elastic Services Controller (ESC) products patch critical vulnerabilities that can be exploited by remote...

Intel releases Spectre 2 microcode updates for Kaby Lake, Coffee Lake, Skylake
2018-02-22 15:20

Intel has released to OEMs a new set of Spectre firmware updates. They include microcode for Kaby Lake, Coffee Lake, and Skylake processors. “This represents our 6th, 7th, and 8th Generation Intel...

What if defenders could see the future? Many clues are out there
2018-02-22 14:37

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce...

Anatomy of a Russian Information Warfare Campaign
2018-02-22 14:18

Cost of Troll Farm: $15 Million. Impact: PricelessWant to meddle with a democracy? Just use its social media outlets against it to amplify already existing social divisions. That's the quick take...