Advanced Threats November 2, 2017 Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening 2 min read - They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
October 30, 2017 DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack 2 min read - Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Threat Intelligence October 25, 2017 Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry 2 min read - An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
October 20, 2017 Security Vulnerability Puts Linux Kernel at Risk 2 min read - A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
October 18, 2017 Researcher Uncovers Shipping Industry Security Flaws 2 min read - Using a simple online search engine, a researcher exposed several shipping industry security gaps that could leave container ships vulnerable to threats.
Software Vulnerabilities October 17, 2017 Don’t Just Put Out the Zero-Day Fire — Get Rid of the Fuel 5 min read - The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
October 2, 2017 Malware Mines Monero on Vulnerable Servers 2 min read - Security researchers reported that threat actors have been targeting vulnerable servers to mine for cryptocurrency since about May 2017.
September 28, 2017 Thermal Security Camera Flaws Could Let Cybercriminals Launch Remote Attacks 2 min read - Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Application Security September 21, 2017 The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security 2 min read - Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.