Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost

Universal Plug and Play networking protocols have never been a friend of security researchers. On Monday, Imperva gave the InfoSec community another reason to dislike UPnP. In a proof-of-concept Distributed Denial of Service (DDoS)...

Accessing Cell Phone Location Information

Accessing Cell Phone Location Information The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell...

Want Your Daughter to Succeed in Cyber? Call Her John

It's time to "do the right thing" when it comes to gender in the hiring and promotion of women in cybersecurity. Four women (and a man named John) offer practical solutions for shifting...

Detecting Cloned Cards at the ATM, Register — Krebs on Security

Much of the fraud involving counterfeit credit, ATM debit and retail gift cards relies on the ability of thieves to use cheap, widely available hardware to encode stolen data onto any...

WannaCry One Year Later: Looking Back at a Milestone

Has it been a year? It seems longer. When the WannaCry ransomware attack hit tens of thousands of individuals and business around the world on May 12, 2017, it wasn’t the first time we...

Multiple Adobe Acrobat Reader DC Vulnerabilities

Cisco Blog > Threat Research Threat Research Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new...

Cyber Attack Hits Family Planning NSW

Ransomware attacks have been circulating data security and infosec news quite heavily since last year’s Wannacry and Petya attacks. Unfortunately, Family Planning New South Wales (NSW) has had a recent encounter with ransomware...

Insider threat blind spot enables employee revenge attacks

Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed organizations. This is clear proof that...

LATEST NEWS

MUST READ