Chinese-Linked APT41 Can Read Your Texts
Larry Loeb | 10/31/2019 | New malware family is designed to have the ability to monitor as well as save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft.
Quantifying Security Results to Justify Costs
Commentary | 10/31/2019 | The CISO job isn't to protect the entire business from all threats for any budget. It's to spell out what level of protection executives can expect for a given budget.
Endpoints Fail Predictably: Absolute
Larry Loeb | 10/29/2019 | A security firm based in Vancouver, Canada, has issued a disturbing 2019 Endpoint Security Trends Report that finds security spending not worth the bucks.
MSFT Floats an ARC
Larry Loeb | 10/29/2019 | As far back as 2015, the group responsible for Domain-based Message Authentication, Reporting & Conformance specification realized that one implementation was not going to solve the problem of email spoofing.
Cylance Discovers WAV Files Can Hide Malware
Larry Loeb | 10/21/2019 | BlackBerry Cylance threat researchers Anuj Soni, Jordan Barth and Brian Marks recently discovered obfuscated malware code that was embedded within WAV audio files.
What's New in the EU Security Market
Oliver Schonschek | 10/18/2019 | This October we visited the trade fair it-sa, which counts as one of the more important IT security exhibitions in the world. They hosted more than 750 security vendors from 25 countries who presented their solutions for the international market.
Even RATs Need Marketing
Larry Loeb | 10/16/2019 | Palo Alto Networks' Unit 42 researchers have discovered a new and previously undocumented Remote Access Tool (RAT).
Close the Gap Between Cyber-Risk and Business Risk
Commentary | 10/11/2019 | Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.
How to Think Like a Hacker
Commentary | 10/10/2019 | In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.
UK Spy Agency Warns About VPN Hacking
Advanced persistent threat actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure.
|