News

United States Capitol Building / Congress / legislation in a digital landscape
Insider Pro | Computerworld  >  100 Best Places to Work in IT [2020]

filling legacy tech skills gap

High-profile departures widen federal government’s security talent shortage

Recent key departures--voluntary and forced--might make it harder for government agencies to find the talent needed to fulfill their security missions.

credit card hack financial breach stealing money traffiking financial data target by igphotography

Macy’s breach is a game-changing Magecart attack

The attackers customized the Magecart code to the Macy's website to steal credit card information in the wallet and new registrations.

smart city - Industry 4.0 - industrial IoT internet of things - mobile wireless network

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails.

cockpit airline airplane control pilot by southerlycourse getty

Are we running out of time to fix aviation cybersecurity?

A new report from the Atlantic Council on aviation cybersecurity underscores the poor state of aviation security — and worse, how poorly understood the problem is within the industry.

Vintage voltmeter gauge / binary code

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability.

Cryptojacking  >  Binary skull, code and bitcoin symbols invade systems as malware

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes.

Quantum computing / security

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.

cyber security abstract wall of locks padlocks

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where...

CrowdStrike logo / Ukraine flag and map on globe / data center servers / binary code

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear.

security threat / danger / attack / warfare / grenade-shaped flash drive with abstract connections

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

Cryptojacking  >  Binary skull, code and bitcoin symbols invade systems as malware

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes.

Quantum computing / security

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.

cyber security abstract wall of locks padlocks

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where...

CrowdStrike logo / Ukraine flag and map on globe / data center servers / binary code

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear.

security threat / danger / attack / warfare / grenade-shaped flash drive with abstract connections

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

Load More