Analysis

Trends and Analysis

‘GhostHook’ Foils Windows 10 64-bit’s Kernel Protection

Microsoft says an attacker needs kernel-level access before they can use the 'GhostHook' technique to install a rootkit.

Nuclear Plants, Hospitals at Risk of Hacked Radiation Monitoring Devices

Security researcher discovers major security flaws that can't be patched or fixed.

Two Arrested for Microsoft Network Intrusion

UK authorities arrest two men for allegedly breaking into Microsoft's network with the intent to steal customer data from the software giant.

Most General Counsels Fret over Data Security

An overwhelming percentage of in-house attorneys say cyberattacks and the impact on their business keeps them up at night, a recent survey shows.

Cloud Security Lessons from the RNC Leak

A poorly configured Amazon S3 bucket that led to a massive data leak could easily happen to any organization not adopting proper cloud security measures.

KPMG: Cybersecurity Has Reached a ‘Tipping Point’ from Tech to CEO...

Still, a majority of US-based chief execs say they will be maintaining and not investing in security technology over the next three years, a recent study shows.

WannaCry? You’re Not Alone: The 5 Stages of Security Grief

As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.

‘Stack Clash’ Smashed Security Fix in Linux

Linux, OpenBSD, Free BSD, Solaris security updates available to thwart newly discovered attack by researchers.

WannaCry Forces Honda to Take Production Plant Offline

Work on over 1,000 vehicles affected at automaker's Sayama plant in Japan while systems were restored.

Russian Hackers Focused on Election Systems in 21 States

A Department of Homeland Security official testified today that hackers tied to the Russian government attempted to infiltrate election systems in nearly two dozen states.

Consumer Businesses Have False Confidence in their Security: Deloitte

Consumer business executives are confident in their ability to respond to cyberattacks but fail to document and test response plans.

The Folly of Vulnerability & Patch Management for ICS Networks

Yes, such efforts matter.

But depending on them can give a false sense of security.