Security News > 2018 > April
![13 Year-Old Configuration Flaw Impacts Most SAP Deployments](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Most SAP implementations continue to be impacted by a security configuration flaw initially documented in 2005, Onapsis warns. read more
![Dutch Police Shut Notorious 'Revenge Porn' Site, Three Arrested](/static/build/img/news/alt/ransomware-statistic-small.jpg)
Dutch police said Thursday they have arrested three men for stealing explicit pictures of girls and young women from their cloud data, and shut down a globally notorious "revenge porn" site. read more
![Why everyone, including small businesses, should be concerned about Russian attacks on IoT devices](/static/build/img/news/alt/phishing-statistics-cybersecurity-scaled-small.jpg)
Attorney Jack Rice spoke with TechRepublic about why Russian state-sponsored cyberattacks are a real threat, and why no organization is too small to be a target.
![Microsoft Issues More Spectre Updates For Intel CPUs](/static/build/img/news/alt/breach-statistics-small.jpg)
Microsoft has released new Spectre mitigations for Windows 10, which include Intel microcode fixes for CPUs running on Windows.
![Rubella Crimeware Kit: Cheap, Easy and Gaining Traction](/static/build/img/news/alt/breach-statistics-small.jpg)
Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial malware payload for social-engineering spam campaigns for just $40 per month.
![Improving Fraud Prevention: Key Steps](/static/build/img/news/alt/crypto-stat-small.jpg)
Kedar Samant of Simility on Leveraging Machine Learning, Data AnalyticsMachine learning and data analytics are both critical to fraud prevention, says Kedar Samant, CTO of Simility.
![Recent BA Ransomware Incidents Serve Up Lessons](/static/build/img/news/alt/phishing-stats-2-small.jpg)
Experts Say Breaches Spotlight Vendor RisksTwo recent security incidents involving ransomware attacks on vendors serve as the latest reminders of the risks business associates pose to healthcare...
![PyRoMine Uses NSA Exploit for Monero Mining and Backdoors](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
![Most SAP systems vulnerable to critical security configuration risk](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a full system compromise...
![How to easily manage CentOS firewalld with an ncurses tool](/static/build/img/news/alt/hackers-statistics-small.jpg)
Jack Wallen shows you how to make working with CentOS 7 iptables much easier with the help of an ncurses-based GUI.