Security news that informs and inspires

All Articles

2228 articles:

RDP Stays in Attackers’ Sights

There has been a sharp increase in scans for exposed RDP servers recently as attackers try to take advantage of the move to remote work.

Microsoft

Banner Health Settles Data Breach Lawsuit

A judge has approved the deal settling all claims related to Banner Health’s 2016 data breach, which includes stipulations for how the hospital operator must improve its information security.

Data Breaches, Healthcare

No Rest For the Wicked as Ransomware Attacks Persist

Ransomware operators have begun using long-held positions inside corporate networks to deploy ransomware.

Ransomware

Spyware for Targeted APT Campaign Sneak into Google Play

Kaspersky researchers discuss how a targeted campaign against Android users in Southeast Asia relied on spyware apps that snuck onto official app marketplaces such as Google Play.

APT

Shade Ransomware Decryption Keys Published

The creators of the Shade ransomware have released the decryption keys for infected systems.

Ransomware

US, Australia Warns About Web Shell Malware

The National Security Agency and the Australian Signals Directorate jointly issued a Cybersecurity Information Sheet with guidelines for enterprises on how to defend web servers from web shell exploits.

Web App Attacks, Web App Security

Decipher Podcast: Jeremy Oddo

Jeremy Oddo of Hollywood visualization studio The Third Floor joins Dennis Fisher to discuss the company's security challenges when moving to a fully remote workforce.

Podcast

Decipher Podcast: David Brumley

David Brumley of Carnegie Mellon University and ForAllSecure joins Dennis Fisher to talk about securing the software supply chain.

Podcast, Software Security

Understanding Asset Mix for Effective Vulnerability Management

Which platform is the riskiest: Windows, Mac, Linux, Unix, or a networking device? Latest research from Kenna Security and Cyentia Institute shows that CISOs have to consider both the number of vulnerabilities and how issues are addressed in order to determine risk.

Risk, Risk Management, CISO

Two iOS Zero Days Used in Limited Attacks

Two vulnerabilities affecting the Mail app in iOS have been used in targeted attacks and one of the flaws requires no user interaction for exploitation.

Apple, Ios

Four Zero Days Found in IBM Data Risk Manager

A security researcher discovered four zero day flaws in IBM's Data Risk Manager product that can lead to remote code execution.

IBM

Supreme Court to Review CFAA For First Time

The US Supreme Court has agreed to review a case related to the Computer Fraud and Abuse Act (CFAA) for the first time ever, a move that could have long-term effects on security research.

Government, CFAA

CISA Urges Resetting Active Directory After Patching VPN

Vulnerabilities need to be patched, but security doesn’t stop with updates since the attackers may already be inside the network. Additional steps may be necessary, such as resetting passwords and looking for evidence of other types of infection or compromise.

Vpn, Patching

DHS Urges Vigilance on North Korean Attackers

The US government is warning of continued attacks from groups associated with the North Korean government.

APT

Managing Vulnerabilities by Crowd-Sourcing Threat Details

Thousands of software vulnerabilities are made public each year, leaving IT and security teams to sift out irrelevant issues from the bugs that need to be fixed. Rapid7's Attacker Knowledge Base brings crowd-sourced feedback to enterprise defenders to help them figure out which flaws to pay attention to.

CISO, Vulnerability Assessment, Patching