Crypto-mining kit built to send Monero to NK’s Kim Il Sung University
Is North Korea developing cryptocurrency mining malware to bypass economic sanctions?
Is North Korea developing cryptocurrency mining malware to bypass economic sanctions?
Enterprises are rushing to implement security tools to protect their networked environments – but those same tools comprised more than half of the 20 most vulnerability-ridden software products based on regular testing during the last quarter, according to new figures from Flexera Software.
David Braue | 30 Nov | Read more
Cybersecurity pros are most likely to leave to find more challenging work, better pay, and more flexible working hours, according to a survey released this morning.
Maria Korolov | 31 Mar | Read more
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders.
Lucian Constantin | 17 Apr | Read more
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program's code.
Lucian Constantin | 05 Dec | Read more
If you believe that protecting against cyberattacks from government agencies requires the same processes as defending against any other threat -- well, to some extent, you are right.
Maria Korolov | 02 Dec | Read more
The Shellshock Bash bug was found in a typical voice-over-IP (VoIP) phone system, opening up the possibility that many more of the business communication systems could be vulnerable if attacked.
Antone Gonsalves | 29 Sep | Read more
Attackers exploiting the Shellshock vulnerability that was discovered in a widely used component of Mac OS X, Linux and Unix had infected by Thursday hundreds of systems with exploratory malware.
Antone Gonsalves | 26 Sep | Read more
AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.
Steve Ragan | 02 Sep | Read more
Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries
Lucian Constantin | 02 Sep | Read more
Security firm AlienVault has added a new feature to its Open Threat Exchange (OTX) crowdsourced intelligence-sharing system which allows organisations to monitor their networks for rogue traffic entering or leaving.
John E Dunn | 02 Jul | Read more
An exploit for a vulnerability that affects all versions of Internet Explorer and has yet to be patched by Microsoft has been integrated into the open-source Metasploit penetration testing tool, a move that might spur an increasing number of attacks targeting the flaw.
Lucian Constantin | 01 Oct | Read more
A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.
Lucian Constantin | 27 Sep | Read more
AlienVault has launched a free crowdsourced security service that promises to alert organisations if any of their public IP addresses or domains turn up on hacker forums, shared blacklists or on the firm's internal reputation database.
John E Dunn | 01 Aug | Read more
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Jeremy Kirk | 09 May | Read more