Breaking News

ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?

ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?

Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of…

8 years ago
Experts spotted Industroyer ICS Malware and linked it to Ukraine Power OutageExperts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…

8 years ago
MacRansom: The first Mac ransomware offered as a RaaS ServiceMacRansom: The first Mac ransomware offered as a RaaS Service

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…

8 years ago
Egypt blocks dozens of websites including ‘Medium’ without any official announcementEgypt blocks dozens of websites including ‘Medium’ without any official announcement

Egypt blocks dozens of websites including ‘Medium’ without any official announcement

The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement. Egyptians…

8 years ago
Analyzing the attack landscape of the Dark Web. There is no honor among thieves.Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark…

8 years ago
Police seized two Tor relays investigating WannaCry attack, others disappeared in the same periodPolice seized two Tor relays investigating WannaCry attack, others disappeared in the same period

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

8 years ago
Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5

Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5

Security experts have discovered a critical kernel command line injection vulnerability in the Motorola handsets Moto G4 and Moto G5.…

8 years ago
Security Affairs newsletter Round 114 – News of the weekSecurity Affairs newsletter Round 114 – News of the week

Security Affairs newsletter Round 114 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Nexpose…

8 years ago
US Defense is working on new multifactor authentication systemsUS Defense is working on new multifactor authentication systems

US Defense is working on new multifactor authentication systems

DARPA is currently developing a multifactor authentication system that will replace the current common access card (CAC). According to a…

8 years ago
SambaCry is reality, crooks are abusing CVE-2017-7494 to spread minersSambaCry is reality, crooks are abusing CVE-2017-7494 to spread miners

SambaCry is reality, crooks are abusing CVE-2017-7494 to spread miners

Security experts from Kaspersky confirmed that threat actors in the wild are exploiting the SambaCry vulnerability CVE-2017-7494 to spread a…

8 years ago