10.1 C
Monday, October 23, 2017

Arby’s Acknowledges Payment Card Breach At US Corporate Stores

More than 355,000 credit and debit cards were reportedly compromised between October 2016 and January 2017.

Malware Investigation Leads To Sophisticated Mideast Threat Network

The infrastructure behind a web shell used in an attack earlier this year suggests methodical and purposeful threat actors, Palo Alto Networks says.

Security Training & Awareness: 3 Big Myths

The once-overwhelming consensus that security awareness programs are invaluable is increasingly up for debate.

New Version Of Dridex Banking Trojan Uses ‘AtomBombing’ To Infect Systems

It's the first malware to use a newly disclosed code-injection method to break into to Windows systems

6 Free Ransomware Decryption Tools

The No More Ransom group has been working to get free decryptor tools into the hands of security professionals and the general public.

Suspect Arrested In Connection With Mirai Botnet

One million Deutsche Telekom customers were knocked offline in a November 2016 cyberattack.

Verizon Data Breach Digest Triangulates Humanity Inside Security

The 99-page report breaks out 16 different attack scenarios and specifies the target, sophistication level, attributes, and attack patterns, along with their times to discovery and containment.

How Attackers Use Machine Learning to Predict BEC Success

Researchers show how scammers defeat other machines, increase their success rate, and get more money from their targets.

67% of Malware Attacks Come by Way of Phishing in Second...

During the second quarter, cyberattacks soared 24% worldwide with phishing attacks playing a large role and Adobe Flash one of the favorite attack targets, according to a report released today by NTT Security.

Best of Black Hat: 20 Epic Talks in 20 Years

In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.

Mimecast Tackles Email-Bound Risks

At RSA, Mimecast cyber security strategy Bob Adams discusses graduating from basic filtering to true email security risk assessment.

A Nation State-Looking Cyberattack that Wasn’t

Symantec researchers uncover a cybercrime campaign with all the hallmarks of a state-sponsored campaign that didn't even make much money for the attackers.