15.4 C
London
Thursday, August 24, 2017

Microsoft Report: User Account Attacks Jumped 300% Since 2016

Most of these Microsoft user account compromises can be attributed to weak, guessable passwords and poor password management, researchers found.

Critical Infrastructure, Cybersecurity & the ‘Devil’s Rope’

How hackers today are engaging in a modern 'Fence Cutter War' against industrial control systems, and what security professionals need to do about it.

‘Pulse Wave’ DDoS Attacks Emerge As New Threat

DDoS botnets are launching short but successive bursts of attack traffic to pin down multiple targets, Imperva says.

The Shadow Brokers: How They Changed ‘Cyber Fear’

At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.

70% of DevOps Pros Say They Didn’t Get Proper Security Training...

Veracode survey shows majority of DevOps pros mostly learn on the job about security.

Kill Switches, Vaccines, & Everything in Between

The language can be a bit fuzzy at times, but there are real differences between the various ways of disabling malware.

How to Avoid the 6 Most Common Audit Failures

In a security audit, the burden is on you to provide the evidence that you've done the right things.

Behind the Briefings: How Black Hat Sessions Get Chosen

Daniel Cuthbert and Stefano Zanero explain what the Black Hat review board is looking for in an abstract submission for the Briefings.

Cerber Fights Anti-Ransomware Tools

Deception technology is the popular ransomware's latest target.

Old Flaws, New Tricks: CVE-2017-0199 and PowerPoint Abuse

Researchers discover attackers are using a patched Microsoft vulnerability to abuse PowerPoint files and distribute malware.

Websites Selling DDoS Services and Tools on the Rise in China

Researchers detect an increase in Chinese websites offering online DDoS services within the past six months.

Insider Threats Loom Large for Security Pros

Insider threats pose a greater challenge to security pros than external threats, according to a recent survey.