Security News > 2019 > February

Learn how to make threat hunting a repeatable process that drives better security outcomes.What is required to take your threat hunting program to the highest level of maturity?
![Ep.021 – Leaked calls, a social media virus and passwords exposed [PODCAST]](/static/build/img/news/alt/phishing-stats-2-small.jpg)
Here's the latest Naked Security podcast - enjoy!

Powerful capabilities of modern browser APIs could be misused by attackers to take control of a site visitor’s browser, add it to their botnet, and use it for a variety of malicious actions,...

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the...

A major data breach would likely shut down half of SMBs permanently, according to an AppRiver report.

Yes it's years out of date but there's no such thing as security through obscurity Cisco's security limb has spotted nefarious people targeting Elasticsearch clusters using relatively ancient...

Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing...

The China-linked threat group has returned in 2018 using updated RATs to launch its attacks, including ZxShell, Gh0st RAT, and SysUpdate malware.

Notice this bit from an article on the arrest of Christopher Hasson: It was only after Hasson's arrest last Friday at his workplace that the chilling plans prosecutors assert he was crafting...

Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing...