All Activity

This stream auto-updates     

  1. Earlier
  2. Ancestry, MyHeritage and others have committed to a policy framework for the collection, protection, sharing and use of consumer genetic data. Click here for the complete article.
  3. Potentially impacted customers include organizations like Aldo, Dunkin Donuts, GE, HauteLook, Nestle Waters, News Corp Australia and Sony. Click here for the complete article.
  4. Potentially impacted customers include organizations like Aldo, Dunkin Donuts, GE, HauteLook, Nestle Waters, News Corp Australia and Sony. View the full article
  5. Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats. Click here for the complete article.
  6. Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats. View the full article
  7. Spam is back with a vengeance, thanks to the demise of attack vectors such as Adobe Flash. Click here for the complete article.
  8. Phishing emails purported to be commercial offers - but were really installing remote administration software on victims’ systems. Click here for the complete article.
  9. Threatpost talks to Commvault's Matt Tyrer about the recent COSCO ransomware attack. Click here for the complete article.
  10. Carrier-grade MikroTik routers are delivering potentially millions of daily cryptomining pages to a single attacker. Click here for the complete article.
  11. Three people believed to be member of the FIN7 (or Carbanak) hacking group have been arrested in Europe, according to the US DOJ. Click here for the complete article.
  12. After researchers found more than 100 Android apps infected by malicious Microsoft Windows executable files, the apps have been removed from Google Play. Click here for the complete article.
  13. A hacker has compromised Reddit's systems and was able to make away with email addresses and account credentials. Click here for the complete article.
  14. Hardest hit were organizations using Office 365, with incidents costing more than $2 million each. View the full article
  15. The flaw opened a hole in IBM's serverless Cloud Functions platform, potentially exposing confidential customer data. View the full article
  16. Few organizations are prepared to mitigate supply-chain risks, despite a majority of them acknowledging they are a huge cyber threat. View the full article
  17. Airport TSA agents don’t check terminals for insecure WiFi networks, so stay on your toes when using hotspots at these airports. Click here for the complete article.
  18. An uncharacteristic spate of strikes against IoT devices in Finland during the summit was likely an indicator of a coordinated cyberespionage effort, researchers said. Click here for the complete article.
  19. Over two billion credentials were stolen in 2017 and contributed to the complex problem of credential spills, credential stuffing and account takeover fraud. Click here for the complete article.
  20. Hackers are embedding malicious code within compromised, uploaded images on trusted Google sites – weaponizing the website and staying under the radar. Click here for the complete article.
  21. Two vulnerabilities were discovered on Dongguan Diqee-branded vacuum cleaners, Thursday. Click here for the complete article.
  22. In a stalking or random criminal scenario, the ability to guide someone to an out-of-the-way, isolated location could be a precursor to kidnapping or worse. Click here for the complete article.
  23. In this InfoSec Insider cyber insurance expert Nick Sanna discusses how to balance threat exposures and protecting assets with insurance against hacking, breaches and vulnerabilities. Click here for the complete article.
  24. Cisco also pushed out seven high-severity fixes for its SD-WAN solution for business users, and a patch for a DoS flaw in the Cisco Nexus 9000 Series Fabric Switches. Click here for the complete article.
  25. This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency. Click here for the complete article.
  26. Apps most often blacklisted by enterprises provide messenger, VoIP and navigation services. Click here for the complete article.
  1. Load more activity