Security News

FBI moves against VPNFilter botnet, claiming Russian involvement and 'national security threat'
2018-05-24 19:06

Warns admins that the malware could be very tough to remove The FBI says it is taking steps to stop the spread of the VPNFilter malware and botnet, warning that it's a national security issue.…

Is Cryptojacking Replacing Ransomware as the Next Big Threat?
2018-05-24 12:22

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues...

Pressures impacting security pros are up, threats are turning up the heat
2018-05-24 12:00

Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers within their...

Okta Adds Threat Intel to Network Context to Eliminate Passwords
2018-05-23 16:21

Okta Unveils Adaptive Single Sign-On and Enhanced Adaptive Multi-Factor Authentication Products read more

Attackers Hide in Plain Sight as Threat Hunting Lags: Report
2018-05-22 13:26

CISO Survey Shows the Importance of Threat Hunting in the Finance Sector read more

The ethical and legal dilemmas of threat researchers
2018-05-21 11:40

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter threat researchers, the...

Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches
2018-05-21 00:49

Here’s an overview of some of last week’s most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing within Office 365 is estimated...

The Hidden Power of Threat Intelligence
2018-05-18 11:18

Organizations today have access to countless sources of threat intelligence. And yet many still struggle to operationalize this intel effectively. Russ Spitler of AlienVault discusses how to...

Relying on legacy security technologies leaves you blind to IoT threats
2018-05-18 11:15

As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT (Industrial IoT) introduce...

How can Office 365 phishing threats be addressed?
2018-05-18 11:00

With the rapid expansion of Office 365, more and more threats can emerge within its infrastructure, particularly via email. This is due in part to the size and ease of compromising Office 365...