Security News

Most Post-Intrusion Cyber Attacks Involve Everyday Admin Tools (Threatpost)
2016-07-06 11:00

Ninety-nine percent of post-intrusion cyberattack activities leverage standard networking, IT administration and other tools as opposed to malware.

Top 10 DDoS attack trends (Help Net Security)
2016-07-05 12:45

DDoS attacks are constantly evolving, both in terms of size as well as sophistication. Not keeping up with the changes in the DDoS attack landscape could leave your business vulnerable to attacks....

LizardStresser IoT Botnet Part of 400Gbps DDoS Attacks (Threatpost)
2016-06-30 23:00

LizardStresser botnet hijacks 1,300 internet-accessible video cameras, enlisting them as pawns in 400Gbps DDoS attacks targeting Brazilian banks and several U.S. gaming firms.

Conficker Used in New Wave of Hospital IoT Device Attacks (Threatpost)
2016-06-30 15:48

Conficker returns from obsolescence to help hijack medical devices and steal patient records.