Security News > 2018 > February

Increasing Number of Industrial Systems Accessible From Web: Study
2018-02-02 05:43

The number of industrial control systems (ICS) accessible from the Internet has increased significantly in the past year, reaching more than 175,000 components, according to a new report from...

Kaspersky Launches New Security Product for Exchange Online
2018-02-02 04:21

Kaspersky Lab has expanded its small and medium-sized business (SMB) offering with a new cloud-based product designed to provide an extra layer of security for the Exchange Online email service in...

$3.5 Million Penalty for Five Small 2012 Breaches
2018-02-01 22:48

Fresenius Medical Care North America Agrees to HIPAA SettlementIn one of the largest HIPAA settlements ever, federal regulators have signed a $3.5 million settlement with a Massachusetts-based...

Oracle MICROS POS Vulnerability Puts 300,000 Systems at Risk
2018-02-01 22:26

Oracle has issued a fix, but many Micros systems could still be vulnerable.

Researchers showcase automated cyber threat anticipation system
2018-02-01 20:49

A group of researchers is trying to develop an automatic early warning system that should help defenders take preventative action before specific cyber attacks start unfolding. How does their...

OCR: Take Action to Avoid Becoming a Cyber Extortion Victim
2018-02-01 20:47

Agency Offers List of Steps to Take to Mitigate the RiskFederal regulators are warning healthcare entities and business associates to take action to prevent becoming the next victim of cyber...

Adobe Flash Player Zero-Day Spotted in the Wild
2018-02-01 20:40

A zero-day exploit targeting Adobe Flash Players has been reported by the South Korean Computer Emergency Response Team and confirmed by Adobe.

Google booted 100,000 malicious developers from Google Play
2018-02-01 19:15

New malware and unwanted apps are discovered on Google Play nearly every day – or so it seems. According to Google’s statistics, in 2017 the company has taken down more than 700,000 apps that...

Crypto Miners May Be the ‘New Payload of Choice’ for Attackers
2018-02-01 18:23

Crypto mining botnets provide a stealthy way to generate big bucks, without the downsides of ransomware.

AutoSploit: Automated mass exploitation of remote hosts using Shodan and Metasploit
2018-02-01 17:27

A “cyber security enthusiast” that goes by VectorSEC on Twitter has published AutoSploit, a Python-based tool that takes advantage of Shodan and Metasploit modules to automate mass exploitation of...