Reports

US ballistic missile defense systems (BMDS) open to cyber attacks

U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit US DoD Inspector General's report revealed United States' ballistic missile defense systems…

7 years ago

M2M protocols can be abused to attack IoT and IIoT systems

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of…

7 years ago

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to…

7 years ago

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…

7 years ago

NHS is still assessing the cost of WannaCry one year later

The UK's Department of Health and Social Care provided an update on the efforts to secure the NHS IT infrastructure,…

7 years ago

GAO report reveals new Pentagon weapon systems vulnerable to hack

According to a new report published by the Government Accountability Office (GAO) almost any new weapon systems in the arsenal…

7 years ago

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Security firm Group-IB has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage…

7 years ago

BEC scams, hacked accounts available from $150 up to $5,000

Security experts from Digital Shadows have conducted an interesting study about the technique adopted by crooks to infiltrate company emails,…

7 years ago

Z-LAB Report – Analyzing the GandCrab v5 ransomware

Experts at the Cybaze Z-Lab have analyzed the latest iteration of the infamous GandCrab ransomware, version 5.0. Malware researchers at…

7 years ago

Akamai Report: Credential stuffing attacks are a growing threat

According to Akamai's latest State of the Internet report on credential stuffing, credential stuffing continues to be growing threat. According to Akamai…

7 years ago

This website uses cookies.