Latest Blog Posts


Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)


Why Cloud Security Is a Shared Responsibility

October 13, 2017 Added by:Sanjay Kalra

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

Comments  (0)


Put Your S3 Buckets to the Test to Ensure Cloud Fitness

October 13, 2017 Added by:Tim Prendergast

Security measures that are critical to attain the basic level of security for your S3 buckets, which are always going to be a target because they store sensitive data.

Comments  (0)


Is Your “Father’s IAM” Putting You at Risk?

October 13, 2017 Added by:Jackson Shaw

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.

Comments  (0)


SAP Cyber Threat Intelligence Report – October 2017

October 13, 2017 Added by:Alexander Polyakov

The October 2017 set of SAP Security Notes consists of 30 patches with the majority of them rated medium.

Comments  (0)


Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)


Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)


Hackers Disrupt Etherparty’s FUEL Token ICO

October 04, 2017 Added by:Ionut Arghire

Vancouver-based Etherparty on Sunday was forced to shut down its website after hackers managed to hijack its ICO (Initial Coin Offering) less than one hour after the launch.

Comments  (0)


The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)


Unpatched Type Confusion Flaw Impacts Microsoft Browsers

September 25, 2017 Added by:Ionut Arghire

A type confusion bug in Microsoft Edge and Internet Explorer remains unpatched as Microsoft doesn’t consider it a security vulnerability, Cybellum reveals.

Comments  (0)


Deceptioneering: Exploring How Humans Are Wired for Deception

September 23, 2017 Added by:Perry Carpenter

No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.

Comments  (0)


Phishing Campaign Abuses Compromised LinkedIn Accounts

September 19, 2017 Added by:Ionut Arghire

A recently observed phishing campaign was abusing compromised LinkedIn accounts to distribute phishing links via private messages and email, Malwarebytes warns.

Comments  (0)


BankBot Spreads via Utility Apps in Google Play

September 18, 2017 Added by:Ionut Arghire

Several utility applications distributed through Google Play have been infected with the BankBot Android banking Trojan, TrendMicro reports.

Comments  (0)


How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties

September 12, 2017 Added by:Min-Hank Ho

Whether ephemerally or permanently, data will be shared with 3rd parties and/or stored in the cloud.

Comments  (0)


No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)


How Secure Are Your Company’s Social Accounts?

September 07, 2017 Added by:Jackson Shaw

It’s really time to start protecting your Facebook, LinkedIn, Twitter, Tumblr, Instagram and all other social media systems with as much security as your accounts payable or human resources system.

Comments  (0)

« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »