Cyber Attacks

Cyber Attacks | News, how-tos, features, reviews, and videos

predictive analytics numbers retro man with binoculars future horizon spying looking

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.

cyber crime cybersecurity

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks.

hack hacker cyber thief theft stolen

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iran-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.

Slack logo/wordmark [2019]

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection.

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

man in the middle phone on a string communicaiton

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

security vulnerabilities in the IoT Internet of Things

SQL Slammer 16 years later: Four modern-day scenarios that could be worse

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

1 weakest link broken rusted chain security breach hacked

Vulnerabilities found in building access system used by schools, governments

Tenable Research discovered four zero-day vulnerabilities in IDenticard's PremiSys access control system, which is used by schools, governments, medical centers, and Fortune 500 companies. Currently no patches are available.

ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

ransomware

Major US newspapers crippled by Ryuk ransomware attack

All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware.

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

stealing a password

Researchers find over 40,000 stolen logins for government portals

A phishing operation led to the theft of more than 40,000 login credentials for government services in 30 countries.

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

fbi badge gun

Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

An enormous ad fraud botnet, 3ve, was shut down after 1.7 million PCs were infected to falsify 12 billion ads per day.

spearfishing trap

Russian Cozy Bear APT 29 hackers may be impersonating State Department

Russian Cozy Bear hackers may be impersonating the U.S. State Department in a large, new spear-phishing campaign, plus other cybersecurity news.

Load More