Threats

Speed of Windows 10 Adoption Not Affected by WannaCry

WannaCry has motivated security teams to stay current on patching but Windows 10 adoption remains the same.

20 Questions for Improving SMB Security

Security leaders in small and medium-sized business who want to up their game need to first identify where they are now, then, where they want to go.

Using DevOps to Move Faster than Attackers

Black Hat USA talk will discuss the practicalities of adjusting appsec tooling and practices in the age of DevOps.

Russian National Receives 5 Years In Jail For Role In ‘Citadel’...

Mark Vartanyan is the second individual to be sent to prison in connection with Citadel.

#HackTor: Tor Opens up its Bug Bounty Program

The popular identity-cloaking service has expanded its private, invite-only vulnerability discovery program to an open one via HackerOne.

Healthcare Industry Lacks Awareness of IoT Threat, Survey Says

Three-quarters of IT decision makers report they are "confident" or "very confident" that portable and connected medical devices are secure on their networks.

US Banks Targeted with Trickbot Trojan

Necurs botnet spreads Trickbot malware to US financial institutions, while new Emotet banking Trojan attacks discovered - signalling increasingly complex attacks on the industry.

Major Online Criminal Marketplaces AlphaBay and Hansa Shut Down

International law enforcement operations result in AlphaBay, the largest online marketplace for selling illegal goods from malware to herion, and Hansa, going dark.

BEC Attacks Far More Lucrative than Ransomware over Past 3 Years

BEC fraud netted cyberthieves five times more profit than ransomware over a three-year period, according to Cisco's midyear report released today.

Microsoft Office 365 Users Targeted in Brute Force Attacks

Attackers leveraged popular cloud service platforms to conduct persistent - and stealthy - login attempts on corporate Office 365 accounts.

DevOps & Security: Butting Heads for Years but Integration Is Happening

A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.

Profile of a Hacker: The Real Sabu

There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.