Security News > 2018 > February

South Korea Warns of Flash Zero-Day Exploited by North Korea
2018-02-01 16:31

South Korea’s Internet & Security Agency (KISA) has issued an alert for a zero-day vulnerability in Flash Player that has reportedly been exploited in attacks by North Korean hackers. read more

Legacy Malware and Legacy Systems Are Not a Legacy Problem
2018-02-01 16:24

Companies must be wary of chasing shiny new threats with shiny new defenses, while leaving legacy systems vulnerable to legacy malware.  read more

AutoSploit: Automated Hacking Tool Set to Wreak Havoc or a Tempest in a Teapot?
2018-02-01 16:00

AutoSploit Automatically Finds Vulnerable Targets via Shodan and Uses Metasploit Exploits to Compromise Hosts read more

Massive Smominru Cryptocurrency Botnet Rakes In Millions
2018-02-01 15:44

Researchers say Smominru threat actors are in control of 500,000 node botnet and earning $8,500 daily mining for Monero cryptocurrency.

WannaMine Malware Spreads via NSA-Linked Exploit
2018-02-01 14:11

A piece of crypto-mining malware is using sophisticated tools for its operations, including a Windows exploit linked to the National Security Agency, security researchers warn. read more

Google Adds Custom Roles Feature to Cloud IAM
2018-02-01 14:00

The Identity & Access Management (IAM) service in the Google Cloud Platform (GCP) now includes a feature that allows users to assign custom roles for finer-grained security. read more

Cybercrime as a Service: Tools + Knowledge = Profit
2018-02-01 13:48

Supply and demand are meant to have an inverse relationship. But on darknet marketplaces, there's both an abundant supply of cybercrime products and services as well as lots of demand, says...

US Data Breaches Hit All-Time High
2018-02-01 13:48

Millions of Payment Cards and Social Security Numbers ExposedThe number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described...

BEC scams surge, cybercriminals target nearly all organizations
2018-02-01 13:30

96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack vector because its lack...

Innovative organizations build security into their cloud strategy
2018-02-01 13:00

Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & Associates sees clear evidence...