Cyber Attacks

Cyber Attacks | News, how-tos, features, reviews, and videos

Intel CPU  >  security
adding processor to circuit board computer hardware

avengers wallpaper

‘Nuff said!

The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...

millennials trust

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.

predictive analytics numbers retro man with binoculars future horizon spying looking

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.

cyber crime cybersecurity

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks.

hack hacker cyber thief theft stolen

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iran-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.

Slack logo/wordmark [2019]

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection.

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

man in the middle phone on a string communicaiton

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

tt19 003 thumbnail
video

What's ahead for cybersecurity in 2019: TECH(talk)

J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.

security vulnerabilities in the IoT Internet of Things

SQL Slammer 16 years later: Four modern-day scenarios that could be worse

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

1 weakest link broken rusted chain security breach hacked

Vulnerabilities found in building access system used by schools, governments

Tenable Research discovered four zero-day vulnerabilities in IDenticard's PremiSys access control system, which is used by schools, governments, medical centers, and Fortune 500 companies. Currently no patches are available.

ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

ransomware

Major US newspapers crippled by Ryuk ransomware attack

All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware.

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

Load More
You Might Also Like