Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 21, 2017

In last week’s blog entry, I mentioned the fact that the Zero Day Initiative (ZDI) published two zero-day advisories (ZDI-17-691 and ZDI-17-692) for vulnerabilities found in Foxit Reader after Foxit...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

4 Principles For Hybrid Cloud Success

The future is cloud. At this point in it’s evolution it’s undeniable. The questions facing organizations now are “how much?” and “how fast?” How do you map out a reasonable path to a cloud deployment?...

View Article

Image may be NSFW.
Clik here to view.

Extend Protection to VMWare Cloud on AWS with Trend Micro™ Deep Security™

On August 28th at VMworld 2017 in Las Vegas, VMware announced initial availability for their unique offering called ‘VMware Cloud on AWS’ allowing customers to run VMware workloads on the AWS cloud....

View Article

Image may be NSFW.
Clik here to view.

Petya expands its scope: A global ransomware threat

Ransomware remains a formidable threat for individual users and businesses alike, particularly as new sample families continue to be discovered by security researchers. What makes ransomware so...

View Article


Image may be NSFW.
Clik here to view.

It’s Back to School Time, So How Do I Keep My Child Safe Online?

The end of the summer can be a pretty stressful time for parents as well as their kids. Apart from the prospect of a return to school, there’s a whole checklist of items to get ready. Schoolbag? Check....

View Article

Image may be NSFW.
Clik here to view.

How hackers have improved their BEC attack methods

Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion...

View Article

Image may be NSFW.
Clik here to view.

VMworld 2017 Recap

VMware featured a number of great announcements at VMworld 2017 including VMware Cloud on AWS. VMware customers can now run new or existing virtualized workloads in the AWS cloud while maintaining...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 28, 2017

The only topic I can bring up this week is the devastation in Texas caused by Hurricane Harvey. Many cities have been completely destroyed and to add insult to injury, Harvey moved back to the Gulf of...

View Article

Image may be NSFW.
Clik here to view.

Edith Wharton, Identity Theft, and the GDPR

During one of my talks for Gartner, I asked the audience, “How many of you have ever had anything stolen?” Many hands went up. Then I asked, “How did you know it was stolen?” The answers generally...

View Article

Image may be NSFW.
Clik here to view.

Smartphones Under Fire: Why We Need to Keep Our Android Devices Safe

If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why...

View Article

Image may be NSFW.
Clik here to view.

An Established Solution for Mobile Threats

As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adware to dangerous...

View Article


Image may be NSFW.
Clik here to view.

UNITEDRAKE Looms Large…Maybe

Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 4,...

Earlier this week, a ‘severe’ vulnerability was discovered in Apache Struts, an open source framework for developing applications in Java. The vulnerability, CVE-2017-9805, affects all versions of...

View Article

Image may be NSFW.
Clik here to view.

Equifax Breach – an Example of Good Communications

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44 percent of the US population. This breach will have a significant impact on a lot of people. Companies...

View Article


Image may be NSFW.
Clik here to view.

Grading our Predictions: See how we faired in 1H 2017

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...

In last week’s blog, I mentioned the Apache Struts vulnerability, which is still making headlines as estimates show that as many as 65 percent of Fortune 500 companies use it in some form. In addition,...

View Article
Browsing all 527 articles
Browse latest View live