Security News > 2019 > December

Vulnerabilities Disclosed in Kaspersky, Trend Micro Products
2019-12-02 20:21

Vulnerabilities discovered in Kaspersky Secure Connection, Trend Micro Maximum Security, and Autodesk Desktop Application could be exploited for DLL preloading, code execution, and privilege...

Europol wipes out 30,000+ piracy sites, three suspects cuffed to walk the legal plank
2019-12-02 20:13

Aw man, I was still downl...err.. great work everyone! Europol says its latest piracy takedown netted three arrests and more than 30,000 website takedowns.…

Surviving a Breach: 8 Incident Response Essentials
2019-12-02 19:48

How to Rapidly and Effectively Respond to a Data BreachOrganizations that suffer a security incident must be prepared to rapidly respond. Here are eight incident response essentials they must...

Authorities Break Up Imminent Monitor Spyware Organization
2019-12-02 19:13

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

Random Acts of Security...or Not?
2019-12-02 18:07

Adversaries Know Our Security Infrastructure is Fragmented and Take Advantage of Blind Spots to Stay Below the Radar read more

Report: APT gang increased cyberattacks on businesses in Q3
2019-12-02 17:16

Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.

'StrandHogg' Vulnerability Exploited by Malicious Android Apps
2019-12-02 17:09

Norwegian app security company Promon on Monday disclosed the existence of a vulnerability that has been exploited by tens of malicious Android apps, and warned that hundreds of popular...

Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses
2019-12-02 17:07

Manufacturers and utilities rank highest while e-commerce companies come in last.

SafeBreach catches 3 major vulnerabilities with Trend Micro, Autodesk and Kaspersky
2019-12-02 16:51

The issues have been patched or solved but researchers say they represent a worrying step in how attackers can manipulate trusted security systems.