April 10, 2015 Fake Government Websites Tricking Victims Into Surrendering PII 2 min read - According to the FBI, Americans are being tricked into giving up their personally identifiable information through fake government websites.
April 3, 2015 DDoS Made Deadlier: Multicast DNS Vulnerability Could Affect More Than 100,000 Devices 2 min read - According to CERT, a miconfiguration in many devices could mean cybercriminals can exploit a multicast DNS vulnerability, making DDoS attacks worse.
April 3, 2015 New Malware Attacks Hunt for Cracks in Energy Sector Defenses 2 min read - New malware attacks from a cybercriminal group are reportedly being used to find holes in energy sector defenses to gain access to trade secrets.
Intelligence & Analytics March 25, 2015 Cyber Careers: US Army Now Recruiting for ‘Exponential’ Growth 3 min read - According to Lt. Gen. Edward Cardon, cyber careers in the U.S. Army are set to grow at an exponential rate to protect the country from threats.
Software Vulnerabilities March 6, 2015 WordPress and the GHOST Vulnerability 3 min read - WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
Endpoint March 3, 2015 How to Stay Off the Data Breach List 3 min read - In the wake of several damaging incidents in 2014, organizations must implement security solutions and controls to avoid being the victim of a data breach.
Advanced Threats February 17, 2015 Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks 3 min read - A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
Software Vulnerabilities February 11, 2015 A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps 5 min read - A new IBM report details potential vulnerabilities in many popular dating apps that could negatively affect your organization's mobile security.
CISO February 5, 2015 The Evolving CISO Policy Role 2 min read - More attention is being focused on the evolving role of the CISO, who must now provide technical knowledge and help shape security policies.
January 28, 2015 Cybercriminals Threaten Data Dump From Hacked Malaysia Airlines Website 3 min read - Cybercriminals belonging to Lizard Squad have threatened to dump data from a hacked Malaysia Airlines website, though the airline refutes the claim.