Zimperium Throws $1.5 Million at Mobile N-day Exploits

Zimperium Launches Exploit Acquisition Program for Android and iOS N-Days, But No Interest in 0-Days

Bug bounty programs exist to encourage researchers to find and report zero-day vulnerabilities. The theory is that the vulnerability is patched and the threat goes away.

Zimperium Launches Exploit Acquisition Program for Android and iOS N-Days, But No Interest in 0-Days

Continue reading “Zimperium Throws $1.5 Million at Mobile N-day Exploits”

RIG Exploit Kit Drops New CryptoMix Ransomware Variant

A new variant of the CryptoMix ransomware is being distributed via the RIG exploit kit (EK), security researchers have discovered.

The distribution of CryptoMix was previously associated with RIG, which has been used to drop other ransomware families, including Cerber.

A new variant of the CryptoMix ransomware is being distributed via the RIG exploit kit (EK), security researchers have discovered.

Continue reading “RIG Exploit Kit Drops New CryptoMix Ransomware Variant”

Bridging the Visibility Gap – The Key to Cloud Success

Organizations Need to Prepare for the Inescapable Future of IT

The landslide shift to the cloud has continued at a rapid pace over the last year. According to the SANS Institute, about 70 percent of companies are now using cloud-based architectures and/or applications.

Organizations Need to Prepare for the Inescapable Future of IT

Continue reading “Bridging the Visibility Gap – The Key to Cloud Success”

Trump’s cyber security executive order delayed

An executive order aimed at boosting US cyber security was not signed on schedule as president Donald Trump turned his attention to legal challenges related to his controversial orders on immigration.

An executive order aimed at boosting US cyber security was not signed on schedule as president Donald Trump turned his attention to legal challenges related to his controversial orders on immigration.

Continue reading “Trump’s cyber security executive order delayed”

Security of industrial systems must be a top priority

Many senior managers in utilities, transportation, healthcare and manufacturing are unaware of the security risks in industrial systems, according to the European Union Agency for Network and Information Security (Enisa).

Many senior managers in utilities, transportation, healthcare and manufacturing are unaware of the security risks in industrial systems, according to the European Union Agency for Network and Information Security (Enisa).

Continue reading “Security of industrial systems must be a top priority”

Rethinking Toxic Data in Light of GDPR

Toxic data is sensitive information that you would rather not retain, but must for the sake of business operations.

Like chemicals used in manufacturing, toxic data is a necessary ingredient for a desired outcome.

Toxic data is sensitive information that you would rather not retain, but must for the sake of business operations.

Continue reading “Rethinking Toxic Data in Light of GDPR”

Researchers Dissect Potent “Locky Bart” Ransomware

A closer look at the inner workings of the Locky Bart ransomware and its backend have provided security researchers with a better understanding of its features compared to those of its predecessors.

A closer look at the inner workings of the Locky Bart ransomware and its backend have provided security researchers with a better understanding of its features compared to those of its predecessors.

Continue reading “Researchers Dissect Potent “Locky Bart” Ransomware”

Critical Flaws Patched in MailStore Server

An update released earlier this month for MailStore Server patches a couple of cross-site scripting (XSS) and open redirect vulnerabilities found by a researcher from Germany-based security firm Secuvera.

MailStore Server is one of the most widely used solutions for email archiving, management and compliance.

An update released earlier this month for MailStore Server patches a couple of cross-site scripting (XSS) and open redirect vulnerabilities found by a researcher from Germany-based security firm Secuvera.

Continue reading “Critical Flaws Patched in MailStore Server”

Don’t Fall For This Sophisticated New PayPal Phishing Scam

Around 200 million people have a PayPal account. It’s been one of the most popular online payment services for years, which is why it’s such a popular target for phishing scams.

Around 200 million people have a PayPal account. It’s been one of the most popular online payment services for years, which is why it’s such a popular target for phishing scams. Since they’re tied to your credit card or bank account, they’re particularly prized by cybercriminals.

Continue reading “Don’t Fall For This Sophisticated New PayPal Phishing Scam”