Companies increasingly investing in container adoption, security remains an issue

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers — an impressive increase from two years ago, when just 67 percent of teams were running container technologies in production, a Portworx and Aqua Security survey reveals. Hurdles Yet despite their pervasiveness, containers aren’t without hurdles: when asked to name their top … More

The post Companies increasingly investing in container adoption, security remains an issue appeared first on Help Net Security.

Posted on 22 May 2019 | 11:45 pm

Number of connected devices reached 22 billion, where is the revenue?

The number of devices connected to the internet reached 22 billion worldwide at the end of 2018, according to the latest research from Strategy Analytics. Enterprise IoT remains the leading segment, accounting for more than half of the market, with Mobile/Computing at just over a quarter. The report predicts, however, that Home will be the fastest growing segment over the coming years, driven by further rapid growth in smart home adoption, particularly in as-yet untapped … More

The post Number of connected devices reached 22 billion, where is the revenue? appeared first on Help Net Security.

Posted on 22 May 2019 | 11:30 pm

Portworx adds new backup and recovery features to its cloud-native storage and data management platform

Portworx, the cloud-native storage and data management company modern enterprises trust to manage data in containers, announced Portworx Enterprise 2.2, an update to its cloud-native storage and data management platform with new features focused on security, data protection, and disaster recovery. With this update, Portworx Enterprise provides a one-command backup and recovery experience for complex applications running on Kubernetes, giving enterprises more control over their mission-critical data. With these new capabilities, Portworx is radically expanding … More

The post Portworx adds new backup and recovery features to its cloud-native storage and data management platform appeared first on Help Net Security.

Posted on 22 May 2019 | 10:30 pm

Governor Ron DeSantis directs Secretary of State to evaluate cyber security of Florida elections

With the recent news of Russian hacking in local elections Governor Ron DeSantis directed Secretary of State Laurel M. Lee to evaluate cyber security ...

Posted on 22 May 2019 | 10:11 pm

US Air Force investigating hacking attempt instigated by the US Navy

The cyber intrusion is said to involve a Navy prosecutor embedding tracking malware in emails sent to an Air Force lawyer involved in a war-crimes ...

Posted on 22 May 2019 | 10:00 pm

Stratoscale enhanced platform delivers multi-cloud hybrid computing functionality

Hybrid cloud infrastructure provider Stratoscale announced the latest version of its namesake platform. Stratoscale V5 delivers key functionality that brings the company a step closer to its vision of multi-cloud hybrid computing, which aims to break down walls separating enterprise environments and the public cloud, applying the cloud-native paradigm across all environments. It offers operational agility for legacy applications and accelerates application development for new ones. The public cloud has become the new operating system … More

The post Stratoscale enhanced platform delivers multi-cloud hybrid computing functionality appeared first on Help Net Security.

Posted on 22 May 2019 | 9:30 pm

Tufin Orchestration Suite release features policy-based automation for server policy cloning

Tufin, a company pioneering a policy-centric approach to security and IT operations, announced the release of Tufin Orchestration Suite R19-1, advancing its leadership in network security automation with the industry’s first solution to feature policy-based automation for server policy cloning. Enterprises today devote significant time and resources to processing access requests related to server policy cloning during application migration. With its new server policy cloning capabilities, the latest version of the award-winning Tufin Orchestration Suite … More

The post Tufin Orchestration Suite release features policy-based automation for server policy cloning appeared first on Help Net Security.

Posted on 22 May 2019 | 9:00 pm

The top skills needed to excel in cybersecurity

This averages out to approximately one serious cyber-attack per day. Attacks on government data can affect a nation's security and future prosperity, ...

Posted on 22 May 2019 | 8:52 pm

The top skills needed to excel in cybersecurity

These instances have cost victims of cybersecurity breaches dearly, from losses of revenue and private information to degradation of trust and public ...

Posted on 22 May 2019 | 8:52 pm

How small businesses can keep their data secure

In the age of technology, it can be harder than ever to keep your data safe. Not only that, it’s also more important than ever to secure your data. However, your small business likely does not have the same resources to put toward data protection as larger competitors, which can easily invite catastrophe. However, if you know how to use the resources that you do have, you can easily secure your data without breaking the … More

The post How small businesses can keep their data secure appeared first on Help Net Security.

Posted on 22 May 2019 | 8:45 pm

Dynatrace’s open AI engine now supports Kubernetes

Software intelligence company Dynatrace, announced that its open AI engine, Davis, now provides even smarter and more precise answers and actionable insights about Kubernetes environments. Through automatically ingesting new Kubernetes cluster and node health, and utilization metrics into Davis and combining them with the rich, high-fidelity application and transaction data that Dynatrace already collects, enterprises can create successful Kubernetes deployments, accelerate innovation through DevOps and increase competitiveness by bringing new services to market faster. New, … More

The post Dynatrace’s open AI engine now supports Kubernetes appeared first on Help Net Security.

Posted on 22 May 2019 | 8:30 pm

Intelligence agencies brief 2020 campaigns on cybersecurity, espionage issues

Among the components of elections, campaigns are particularly vulnerable among to foreign hacking operations. Though Russia's 2016 election ...

Posted on 22 May 2019 | 8:18 pm

Emsisoft releases a free decrypter for the GetCrypt Ransomware

Malware researcher @nao_sec discovered the ransomware and ethical hacker @VK_Intel shared his analysis of the exploit to BleepingComputer.

Posted on 22 May 2019 | 8:18 pm

Intelligence agencies brief 2020 campaigns on cybersecurity, espionage issues

(CNN) The US intelligence community has briefed presidential campaigns on potential cybersecurity and espionage issues they may face ahead of ...

Posted on 22 May 2019 | 8:07 pm

Citrix to extend Citrix Workspace to Google Cloud

The race to the cloud is on and it’s about to pick up speed. Citrix Systems announced plans to extend Citrix Workspace to Google Cloud, expanding the flexibility and choice companies have in transitioning to the cloud by enabling them to quickly and efficiently deliver apps to Google devices and operating systems and create a superior digital work experience that unleashes productivity and innovation. The news came during Citrix Synergy, the premier digital work conference … More

The post Citrix to extend Citrix Workspace to Google Cloud appeared first on Help Net Security.

Posted on 22 May 2019 | 8:00 pm

Amazon Shareholders Support Selling Face Recognition Tech to Police

Amazon on Wednesday confirmed that shareholders rejected proposals to prohibit sales of facial recognition technology to governments and study how it might threaten privacy or civil rights.

read more

Posted on 22 May 2019 | 7:59 pm

Seqrite says it is detecting daily intrusions by banking malware Emotet

Seqrite, the enterprise security solutions arm of Quick Heal Technologies, said it has been detecting more daily intrusions by banking malware Emotet ...

Posted on 22 May 2019 | 7:47 pm

Seqrite says it is detecting daily intrusions by banking malware Emotet

Seqrite, the enterprise security solutions arm of Quick Heal Technologies, said it has been detecting more daily intrusions by banking malware Emotet ...

Posted on 22 May 2019 | 7:47 pm

China's Hikvision says takes cybersecurity seriously: China Daily

SHANGHAI (Reuters) - China's Hangzhou Hikvision Digital Technology Co Ltd takes cybersecurity seriously and abides by applicable laws and rules ...

Posted on 22 May 2019 | 7:33 pm

Georgia Tech offers credit monitoring after personal information of 1.3M exposed in data breach

Georgia Tech is offering credit monitoring and identity theft protection services to those who were impacted by a data breach. In April, 11Alive learned ...

Posted on 22 May 2019 | 7:33 pm

Monkton deploys new app for source code management, CI/CD, security scanning to USAF

Monkton, the market leader for secure, NIAP Compliant mobile apps, has deployed the first mobile app in the U.S. Air Force (USAF) that enables maintainers to perform their work directly on the flight line with mobile devices. “This is a huge win for our Department of Defense, aligning directly with the mandate of increasing air readiness,” commented Harold Smith III, CEO and co-founder of Monkton, Inc. He continued, “The project started off on the 5-yard … More

The post Monkton deploys new app for source code management, CI/CD, security scanning to USAF appeared first on Help Net Security.

Posted on 22 May 2019 | 7:30 pm

Trial Delayed Over Spying On SEAL Eddie Gallagher's Defense Team

Navy SEAL Eddie Gallagher's trial was delayed Wednesday to allow an investigation into the prosecution's use of malware to spy on several parties ...

Posted on 22 May 2019 | 7:11 pm

Jumio and Nok Nok Labs to offer account recovery solution

Jumio, the leading AI-powered trusted identity as a service provider, announced a new partnership with Nok Nok Labs, the trusted leader in next generation authentication. With the fully integrated Nok Nok S3 Suite and Jumio’s identity verification technologies for account recovery, customers can avoid difficult, time-consuming custom integrations and instead leverage the integrations of email- and SMS-based one-time passcode (OTP). Every year tens of millions of smartphones, including company-issued phones, are lost or stolen, with … More

The post Jumio and Nok Nok Labs to offer account recovery solution appeared first on Help Net Security.

Posted on 22 May 2019 | 7:00 pm

Warning: Ransomware getting more devious. Protect your devices now.

The public can't make online payments to various city departments and ... Ransomware is a type of malware designed to deny access to a computer system ... Phil Quade, Fortinet's chief information security officer in a press release.

Posted on 22 May 2019 | 7:00 pm

Your Personal Information Likely for Sale on the Dark Web

Ed Cabrera, a cyber security expert with TrendMicro, set up a computer to take NBC 6 Responds inside the dark web. He showed us passports, cloned ...

Posted on 22 May 2019 | 6:54 pm

Your Personal Information Likely for Sale on the Dark Web

Ed Cabrera, a cyber security expert with TrendMicro, set up a computer to take NBC 6 Responds inside the dark web. He showed us passports, cloned ...

Posted on 22 May 2019 | 6:54 pm

Governor DeSantis calls for more cyber security for elections

PALM BEACH COUNTY, Fla. — Florida Governor Ron DeSantis says he is asking the Secretary of State to begin reviewing election systems security ...

Posted on 22 May 2019 | 6:53 pm

DNS Flag Day 2020: DNS servers must support both UDP and TCP queries

Industry group wants to make DNS over TCP support mandatory.

Posted on 22 May 2019 | 6:52 pm

Cyber security roles set to flourish in SA

As new industry opportunities grow in South Australia, so too does the demand for employee technical expertise in other supportive areas – with cyber ...

Posted on 22 May 2019 | 6:48 pm

Governor DeSantis calls for more cyber security for elections

PALM BEACH COUNTY, Fla. — Florida Governor Ron DeSantis says he is asking the Secretary of State to begin reviewing election systems security ...

Posted on 22 May 2019 | 6:48 pm

Cyber security roles set to flourish in SA

While cyber security represents a significant future career, is not new – though it has swiftly grown and intensified in recent decades. It entered ...

Posted on 22 May 2019 | 6:48 pm

UK has warned 16 NATO allies of Russia hacking attempts: foreign minister

Britain has shared with 16 NATO allies details of malicious Russian cyber activity in their countries over the last 18 months, foreign minister Jeremy ...

Posted on 22 May 2019 | 6:42 pm

DELANEY PROPOSES CABINET LEVEL NATIONAL CYBER SECURITY POST

Democratic presidential candidate John Delaney was in Sioux City Wednesday, holding a noon hour meet and greet with local supporters at Rebo's ...

Posted on 22 May 2019 | 6:37 pm

Alphabet's Chronicle Explores Code-Signing Abuse in the Wild

Malware authors buy these certificates, directly or through resellers. While a CA can revoke a certificate deemed untrustworthy — and more of them ...

Posted on 22 May 2019 | 6:32 pm

Privacy Awareness Week

Original release date: May 22, 2019

The Federal Trade Commission (FTC) has released an announcement promoting Privacy Awareness Week (PAW). PAW is an annual event fostering awareness of privacy issues and the importance of protecting personal information. This year’s theme, “Protecting Privacy is Everyone’s Responsibility,” focuses on promoting privacy awareness for consumers and businesses.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages consumers and organizations to review FTC’s post and consider the following practices to protect privacy and safeguard data:


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 22 May 2019 | 6:31 pm

After data breach, Augustana College alumni are demanding answers

For affected alumni, the data breach has stoked frustration and anxiety, with questions still swirling about the nature of the attack and lingering risk.

Posted on 22 May 2019 | 6:26 pm

Hacking Grad School

Inspired by my time writing for GradHacker, I titled it “Hacking Graduate School and What Comes After: My unsolicited advice on surviving graduate ...

Posted on 22 May 2019 | 6:20 pm

Britain helped 16 Nato countries tackle Russia cyber threat, says Hunt

Countries outside of Nato have also been informed about Russian cyber threats by the National Cyber Security Centre, which was set up in October ...

Posted on 22 May 2019 | 6:03 pm

Ransomware' Cyber Attack on Baltimore City Services Investigated by FBI

More than two weeks after a cyber attack, 10,000 of Baltimore's city government computers remain frozen. The attack occurred on May 7. Hackers ...

Posted on 22 May 2019 | 6:01 pm

Ransomware Cyber Attack on Baltimore City Services Investigated by FBI

More than two weeks after a cyber attack, 10,000 of Baltimore's city government computers remain frozen. The attack occurred on May 7. Hackers ...

Posted on 22 May 2019 | 6:01 pm

Ransomware' Cyber Attack on Baltimore City Services Investigated by FBI

More than two weeks after a cyber attack, 10,000 of Baltimore's city government computers remain frozen. The attack occurred on May 7. Hackers ...

Posted on 22 May 2019 | 6:01 pm

Proposed Idaho powerline could help US cybersecurity efforts

Federal officials are taking public comments on a plan to build a 16.5-mile powerline at an eastern Idaho nuclear site as part of a cybersecurity effort to ...

Posted on 22 May 2019 | 5:58 pm

MTN scores a dismal 16% for data security in global accountability index

Africa's largest telecommunications operator is failing to protect user data and digital rights, according to Ranking Digital Rights' Corporate ...

Posted on 22 May 2019 | 5:58 pm

SEAL's trial delayed as defense seeks info on email snooping

"The Air Force is treating this malware as a cyber-intrusion on their network," Wilson said in the letter obtained by The Associated Press. He said most ...

Posted on 22 May 2019 | 5:41 pm

Agari comments about FEC Ruling on US Presidential Campaign Cybersecurity Technology Issue

FOSTER CITY, Calif., May 22, 2019 /PRNewswire/ -- The Federal Election Commission (FEC) ruled in favor of the DDC partnering with leading ...

Posted on 22 May 2019 | 5:41 pm

Baltimore still refuses to pay hackers who hit city with ransomware

More than two weeks after the incident began, the city of Baltimore is refusing to pay hackers who infected government-owned computers with ...

Posted on 22 May 2019 | 5:35 pm

Wireless Co. Beats Ubiquiti's Suit Over Hacking Firmware

Law360 (May 22, 2019, 6:33 PM EDT) -- Ubiquiti Networks Inc. made overly broad claims that a rival wireless networking company sells hacking ...

Posted on 22 May 2019 | 5:30 pm

Facebook, Twitter, Google Seek to Assuage Lawmakers About 2020

... is no silver bullet, but we will continue to work to get it right," said Richard Salgado, Google's director of law enforcement and information security.

Posted on 22 May 2019 | 5:30 pm

DHS official: Florida one of the 'best' states on election security, despite 2016 Russian hack

Christopher Krebs, the director of the Department of Homeland Security's cyber agency, described Florida as one of the "best" states in terms of ...

Posted on 22 May 2019 | 5:21 pm

Data Asset Management: What Do You Really Need?

"It's really critical to us to know what we have," said Stacey Halota, vice president of information security and privacy at Graham Holdings Co., during a ...

Posted on 22 May 2019 | 5:12 pm

US election cybersecurity agency staff 'strained to the breaking point'

But since the 2016 U.S. presidential election, the agency has also taken on additional responsibilities related to cybersecurity, McCormick said.

Posted on 22 May 2019 | 5:07 pm

How to Prevent Your Data from Breaching – Tips for Businesses

You may assume that you will not be a target to hacker and malware attacks. In reality, hackers target almost every business. Cybercrime is a huge ...

Posted on 22 May 2019 | 5:04 pm

Hackers hold US city of Baltimore to ransom demanding 13 bitcoins

A similar cyber attack hit Atlanta last year, according to NBC, costing millions to recover damage, while Greenville in North Carolina was targetted in ...

Posted on 22 May 2019 | 5:04 pm

Private Tunnel Has a New Pricing Plan

Gone are the days where families shared one computer and one phone: ... This is a Security Bloggers Network syndicated blog from Private Tunnel ...

Posted on 22 May 2019 | 5:02 pm

Budget for IT security — or your company could be the next cautionary tale

The implications of being lax in the approach to information security are typically lost on small business owners, but some recent incidents can ...

Posted on 22 May 2019 | 4:57 pm

Panel: all vulnerable to cyber crime so collaboration needed

Panel: all vulnerable to cyber crime so collaboration needed .... Michael Senft, deputy chief of cybersecurity operations for National Security Agency ...

Posted on 22 May 2019 | 4:56 pm

Attackers Are Signing Malware With Valid Certificates

There used to be a time when a signed Windows executable file meant it was a file from a legitimate organization and safe to use, and malware was ...

Posted on 22 May 2019 | 4:56 pm

Budget for IT security — or your company could be the next cautionary tale

The implications of being lax in the approach to information security are typically lost on small business owners, but some recent incidents can ...

Posted on 22 May 2019 | 4:56 pm

Global Mobile Anti-Malware Market Product, Region and Application To 2028

An advanced report has been added to the Market.us titled, “Mobile Anti-Malware Market Research Report 2019 Global and Regional Forecast to ...

Posted on 22 May 2019 | 4:56 pm

Can you hack your way to a better life?

From dating to diets, saving money or doing chores, it seems there's a life hack for everything these days, but how helpful are strategies that promise to ...

Posted on 22 May 2019 | 4:54 pm

Microsoft Windows 2019 update patch: Fix PC freezing during reboot?

Microsoft recently launched new patch Tuesday updates of May 2019 for Windows 10 users. But, ironically it has put Microsoft Windows 10 users in ...

Posted on 22 May 2019 | 4:52 pm

Police say woman deleted company documents, accounts without permission

AUSTIN (KXAN) — A warrant has been issued for a woman accused of deleting company files using company login information and access.

Posted on 22 May 2019 | 4:34 pm

If Hackers Hit Pittsburgh, Peduto Says The City Won't Pay

City officials across the nation are re-evaluating cyber security protocols after a breach in Baltimore shut down its servers two weeks ago. Hackers are ...

Posted on 22 May 2019 | 4:32 pm

New Reporting Requirements Under Arkansas' Data Breach Law

Arkansas has updated its breach notification law to expand the definition of “personal information” and to require notifying the Arkansas Attorney ...

Posted on 22 May 2019 | 4:22 pm

Evans High School all-girls cyber-security team will compete in Nationals

Evans High School all-girls cyber-security team will participate in the national championship round for "Girls Go CyberStart." 11,000 high school girls ...

Posted on 22 May 2019 | 4:22 pm

Gov. Ron DeSantis Directs Secretary of State to Evaluate Cybersecurity of Election Systems in ...

TALLAHASSEE, FLORIDA – Today, Governor Ron DeSantis directed Secretary of State Laurel M. Lee to initiate a review of elections systems security ...

Posted on 22 May 2019 | 4:22 pm

Taking Advantage Of AI In Cyber Security Strategies

There is no shortage of new and modern technologies entering the market that display the potential to change cyber security as we know it.

Posted on 22 May 2019 | 4:20 pm

Global Antivirus Software Market Research Report 2019

Global Antivirus Software Market gives valuable reviews and key research including the conventional market patterns, forthcoming and inventive ...

Posted on 22 May 2019 | 4:19 pm

Taking Advantage Of AI In Cyber Security Strategies

There is no shortage of new and modern technologies entering the market that display the potential to change cyber security as we know it.

Posted on 22 May 2019 | 4:11 pm

Lower fines for firms that admit role in data breach

Organisations that admit their role in a data breach and plead guilty to it may get a lower financial penalty from the privacy watchdog if the cause is a ...

Posted on 22 May 2019 | 4:10 pm

Computer vision tools reach into test, healthcare, security

Across industries like healthcare, manufacturing, automotive, e-commerce, security, warehousing and law enforcement, computer vision use cases are ...

Posted on 22 May 2019 | 4:03 pm

NJ prosecutor to head new state cybersecurity agency

Albany. A federal prosecutor from New Jersey will head the new Cybersecurity Division at the state Department of Financial Services. Justin Herring ...

Posted on 22 May 2019 | 3:59 pm

Equifax just became the first company to have its outlook downgraded for a cyber attack

Moody's has just slashed its rating outlook on Equifax, the first time cybersecurity issues have been cited as the reason for a downgrade.

Posted on 22 May 2019 | 3:52 pm

Equifax just became the first company to have its outlook downgraded for a cyber attack

Moody's has just slashed its rating outlook on Equifax, the first time cybersecurity issues have been cited as the reason for a downgrade.

Posted on 22 May 2019 | 3:52 pm

Equifax just became the first company to have its outlook downgraded for a cyber attack

Moody's has just slashed its rating outlook on Equifax, the first time cybersecurity issues have been cited as the reason for a downgrade.

Posted on 22 May 2019 | 3:52 pm

Equifax just became the first company to have its outlook downgraded for a cyber attack

... continues to suffer from the massive 2017 breach of consumer data. ... As CNBC previously reported, the stolen Equifax data has never been found ...

Posted on 22 May 2019 | 3:52 pm

Florida officials wanted an elections cybersecurity team. Lawmakers said no.

Last year, then-Secretary of State Ken Detzner asked the Legislature for $488,000 to create a full-time elections cybersecurity team with five people, ...

Posted on 22 May 2019 | 3:48 pm

The Supply Side: Walmart cybersecurity team handles over 200 billion events annually

Data breaches are always on the minds of retailers regardless of their size. In brick-and-mortar stores or online, all retailers face millions of hacker ...

Posted on 22 May 2019 | 3:37 pm

The Supply Side: Walmart cybersecurity team handles over 200 billion events annually

Walmart recently held its third annual Sp4rkCon (pronounced “Spark Con”) Information Security conference in Bentonville at the David Glass ...

Posted on 22 May 2019 | 3:37 pm

The Supply Side: Walmart cybersecurity team handles over 200 billion events annually

Walmart said it holds the free seminar to convene small businesses and other cybersecurity professionals regardless of the industry they serve.

Posted on 22 May 2019 | 3:37 pm

The Supply Side: Walmart cybersecurity team handles over 200 billion events annually

Walmart recently held its third annual Sp4rkCon (pronounced “Spark Con”) Information Security conference in Bentonville at the David Glass ...

Posted on 22 May 2019 | 3:37 pm

Best Strategies to Communicate Cybersecurity Risk to the Board

“There is also evidence that C-suite executives in many organizations lack the understanding and awareness needed to prioritize cybersecurity,” they ...

Posted on 22 May 2019 | 3:32 pm

Best Strategies to Communicate Cybersecurity Risk to the Board

To start building a dialogue, security leaders need to provide board members with data that can help them make informed decisions around ...

Posted on 22 May 2019 | 3:32 pm

How businesses can protect themselves from cyber-related losses

Executives know that their business could be hit with a cyberattack or suffer other losses due to systems failures or security incidents. If they don't have ...

Posted on 22 May 2019 | 3:27 pm

Best Strategies to Communicate Cybersecurity Risk to the Board

Best Strategies to Communicate Cybersecurity Risk to the Board ... can help security leaders successfully communicate cybersecurity risks and ...

Posted on 22 May 2019 | 3:26 pm

Cause Celeb: Amber Heard backs 'revenge porn' bill on Capitol Hill

Sound bite: Heard's tone was passionate as she described the fallout, even years later, from her hacking. “My stolen and manipulated photos are still ...

Posted on 22 May 2019 | 3:20 pm

What is a Hash? (And How Does It Work?)

They do this by keeping an internal database of hash values belonging to known malware. On scanning a system, the AV engine calculates a hash ...

Posted on 22 May 2019 | 3:15 pm

What is a Hash? (And How Does It Work?)

This must have seemed like a neat solution in the early days of cyber security, but it's not hard to see the flaws in relying on hash values given ...

Posted on 22 May 2019 | 3:15 pm

What's next for Huawei after US trade blacklist?

Major technology companies are considering their next steps after the United States blacklisted Chinese tech giant Huawei over national security ...

Posted on 22 May 2019 | 3:13 pm

Data privacy and GDPR at one year, a US perspective. Part One - report card

NEW YORK (Thomson Reuters Regulatory Intelligence) - Risks associated with data, data privacy, and the changing global regulatory landscape for ...

Posted on 22 May 2019 | 3:04 pm

TalkTalk Failed To Notify Thousands Of Customers Of Data Breach: BBC

Broadband and email service TalkTalk failed to notify 4,545 customers that their personal data was breached in 2015, according to an investigation by ...

Posted on 22 May 2019 | 3:03 pm

US officials say foreign election hacking is inevitable

WASHINGTON — The hacking of U.S. election systems, including by foreign adversaries, is inevitable and the real question is how the country ...

Posted on 22 May 2019 | 3:03 pm

Two more Microsoft zero-days uploaded on GitHub

SandboxEscaper has now published seven zero-days in Microsoft products; two more to come.

Posted on 22 May 2019 | 2:57 pm

DeSantis orders 'top priority' cybersecurity review of state, county election systems

In a one-page letter to Lee, the state's top elections official, DeSantis indicated the review will focus on cybersecurity and involve all 67 counties.

Posted on 22 May 2019 | 2:52 pm

Global Antivirus Software Package Market Intelligence Report 2019: Avast Software, Microsoft ...

The “Antivirus Software Package Market (2019–2025) Global Industry Analysis” research publication offers readers with a comprehensive knowledge ...

Posted on 22 May 2019 | 2:52 pm

How to improve cybersecurity by avoiding tech jargon

“There's a serious gap in communication skills between cybersecurity pros and their general audiences, and it's essential for the people on the IT side ...

Posted on 22 May 2019 | 2:52 pm

How to improve cybersecurity by avoiding tech jargon

“There's a serious gap in communication skills between cybersecurity pros and their general audiences, and it's essential for the people on the IT side ...

Posted on 22 May 2019 | 2:52 pm

How to improve cybersecurity by avoiding tech jargon

“Increasingly complex security threats demand that cybersecurity ... “People are the weakest link in computer security and many companies don't ...

Posted on 22 May 2019 | 2:52 pm

Elderly Hoover man loses life savings in tech support scheme

Last month, 84-year-old Newell Brand was told his computer needed ... Our cyber security expert says it's also a good idea to get a secondary debit ...

Posted on 22 May 2019 | 2:41 pm

US official says foreign election hacking is 'inevitable'

WASHINGTON (AP) — A Justice Department official says the hacking of U.S. election systems is “inevitable” and the real question is how the country ...

Posted on 22 May 2019 | 2:40 pm

Over 90% of data transactions on IoT devices are unencrypted

An attacker who gained access to the local network -- for example through a malware attack -- could use Address Resolution Protocol (ARP) spoofing ...

Posted on 22 May 2019 | 2:40 pm

Over 90% of data transactions on IoT devices are unencrypted

The new report released today by network security firm Zscaler is based on telemetry data collected from the company's cloud. It covers over 56 million ...

Posted on 22 May 2019 | 2:40 pm

DFS Creates Cybersecurity Division, Naming NJ Federal Prosecutor as Head

New York's financial regulatory agency has created a first-in-the-nation cybersecurity division to place special focus on protecting the state's ...

Posted on 22 May 2019 | 2:39 pm

US officials say foreign election hacking is inevitable

WASHINGTON (AP) — The hacking of U.S. election systems, including by foreign adversaries, is inevitable and the real question is how the country ...

Posted on 22 May 2019 | 2:38 pm

Hackers Are Holding Baltimore Hostage: How They Struck and What's Next

More than two weeks ago, hackers seized parts of the computer systems that run Baltimore's government. It could take months of work to get the ...

Posted on 22 May 2019 | 2:31 pm

Hackers Are Holding Baltimore Hostage: How They Struck and What's Next

More than two weeks ago, hackers seized parts of the computer systems ... On May 7, the city discovered that it was a victim of a ransomware attack, ...

Posted on 22 May 2019 | 2:31 pm

US official says foreign election hacking is 'inevitable'

WASHINGTON — A Justice Department official says the hacking of U.S. election systems is "inevitable" and the real question is how the country ...

Posted on 22 May 2019 | 2:30 pm

India ranks 14th in global online cyber attacks

Kolkata: Cyber attackers seem to have had a field day during January-March, 2019, for more reasons than one. As high as 31 per cent of Indian users ...

Posted on 22 May 2019 | 2:30 pm

US official says foreign election hacking is 'inevitable'

WASHINGTON | A Justice Department official says the hacking of U.S. election systems is “inevitable” and the real question is how the country ...

Posted on 22 May 2019 | 2:30 pm

Legal Threats Make Powerful Phishing Lures

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the ...

Posted on 22 May 2019 | 2:26 pm

Legal Threats Make Powerful Phishing Lures

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the ...

Posted on 22 May 2019 | 2:26 pm

Legal Threats Make Powerful Phishing Lures

On or around May 12, at least two antivirus firms began detecting booby-trapped Microsoft Word files that were sent along with some various of the ...

Posted on 22 May 2019 | 2:26 pm

Legal Threats Make Powerful Phishing Lures

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days -- or else. Here's a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware.

Posted on 22 May 2019 | 2:26 pm

Cybersecurity Campaign Aid Approved to Prevent Future Hacking

The advisory opinion emphasized the foreign cybersecurity threat posed to U.S. campaigns, which was highlighted by Russian hacking of Democratic ...

Posted on 22 May 2019 | 2:25 pm

Cybersecurity Campaign Aid Approved to Prevent Future Hacking

Presidential and congressional candidates running in 2020 will be able to tap cybersecurity aid provided by a new, privately funded program under an ...

Posted on 22 May 2019 | 2:25 pm

DHS suggests new role for cybersecurity staff — helping with border crisis

The Department of Homeland Security (DHS) is asking its cybersecurity-focused employees to consider taking on new roles by volunteering to help ...

Posted on 22 May 2019 | 2:23 pm

Mayor Peduto Says City 'Will Not Pay' Ransom In Event Of Cyberattack

PITTSBURGH (KDKA) — The City of Pittsburgh is talking about cyber security in light of the ransomware attack that knocked the city of Baltimore offline ...

Posted on 22 May 2019 | 2:18 pm

Mayor Peduto Says City 'Will Not Pay' Ransom In Event Of Cyberattack

PITTSBURGH (KDKA) — The City of Pittsburgh is talking about cyber security in light of the ransomware attack that knocked the city of Baltimore offline ...

Posted on 22 May 2019 | 2:18 pm

Gov. DeSantis directs Secretary of State to evaluate cyber security of elections in Florida

Ron DeSantis directed Secretary of State, Laurel M. Lee, on Wednesday to initiate a review of elections systems security and cyber security throughout ...

Posted on 22 May 2019 | 2:18 pm

Gov. DeSantis directs Secretary of State to evaluate cyber security of elections in Florida

Ron DeSantis directed Secretary of State, Laurel M. Lee, on Wednesday to initiate a review of elections systems security and cyber security throughout ...

Posted on 22 May 2019 | 2:18 pm

Proposed Idaho powerline could help US cybersecurity efforts

The Idaho National Laboratory contains one of the United States' primary cybersecurity facilities that uses the existing power grid at the site for ...

Posted on 22 May 2019 | 2:18 pm

GetCrypt Ransomware Brute Forces Credentials, Decryptor Released

If successful, it will download and install GetCrypt into Windows. You can see an example of the exploit kit infecting a computer from this any.run ...

Posted on 22 May 2019 | 2:18 pm

Cybersecurity Campaign Aid Approved to Prevent Future Hacking

The long-awaited response to a bipartisan proposal will permit federal campaigns and others to accept help to prevent hacking in the wake of Russian ...

Posted on 22 May 2019 | 2:18 pm

Misconfigured IT (Again) Leads to Big Health Data Breach

An all-too-common type of data security mistake - a misconfigured IT setting - has landed a Puerto Rico-based clearinghouse and cloud software ...

Posted on 22 May 2019 | 2:18 pm

Misconfigured IT (Again) Leads to Big Health Data Breach

An all-too-common type of data security mistake - a misconfigured IT setting - has landed a Puerto Rico-based clearinghouse and cloud software ...

Posted on 22 May 2019 | 2:18 pm

Proposed Idaho Powerline Could Help US Cybersecurity Efforts

The Idaho National Laboratory, known mainly for its nuclear research work, also contains one of the United States' primary cybersecurity facilities that ...

Posted on 22 May 2019 | 2:14 pm

US, European Officials Bring Charges In Global Malware Case

WASHINGTON (AP) – Ten people, including five Russian fugitives, have been charged in connection with malicious software attacks that infected tens ...

Posted on 22 May 2019 | 2:12 pm

Debunking 5 costly and common cyber security myths

Hackers around the world are trying non-stop to steal confidential information and commit identity theft. Or if that is too much effort, they head to the ...

Posted on 22 May 2019 | 2:08 pm

Debunking 5 costly and common cyber security myths

Hackers around the world are trying non-stop to steal confidential information and commit identity theft. Or if that is too much effort, they head to the ...

Posted on 22 May 2019 | 2:08 pm

Debunking 5 costly and common cyber security myths

Truth: While a good antivirus program is obviously important, it is not enough to keep you 100 percent safe. To protect yourself, regularly back your ...

Posted on 22 May 2019 | 2:08 pm

Debunking 5 costly and common cyber security myths

Hackers around the world are trying non-stop to steal confidential information and commit identity theft. Or if that is too much effort, they head to the ...

Posted on 22 May 2019 | 2:08 pm

Trial coming for Lewiston man suspected of viewing child porn

During a preliminary hearing 2018, the company's IT Security Manager where ... 2015, when suspicious material appeared on his company computer.

Posted on 22 May 2019 | 2:07 pm

Proposed Idaho powerline could help US cybersecurity efforts

BOISE, Idaho (AP) — Federal officials are taking public comments on a plan to build a 16.5-mile (27-kilometer) powerline at an eastern Idaho nuclear ...

Posted on 22 May 2019 | 2:07 pm

3 Ways Microsoft Edge Makes the Internet More Secure

Exposure to malicious websites and downloads is the main way computers get infected with malware, so a better browser is one way to tighten ...

Posted on 22 May 2019 | 1:56 pm

OMB Issues New Policy for Credentialing People, Devices and Bots

Those teams should include the chief information officer, chief financial officer, human resources, general counsel, chief information security officer, ...

Posted on 22 May 2019 | 1:41 pm

The changing landscape of cybersecurity

Bad actors have been seeking opportunities to take advantage of unsophisticated netizens or unprotected organizations since the dawn of the World ...

Posted on 22 May 2019 | 1:38 pm

Republican Governor Ron DeSantis Orders a Review of 2016 Election Hacking Attempts

Florida's Republican Gov. Ron DeSantis has ordered a state-wide review of the security of Florida's election systems. The state's Department of State ...

Posted on 22 May 2019 | 1:36 pm

Cyberattack leaves Baltimore shut down for two weeks - can it happen in the Miami Valley?

Representatives for Kettering and Centerville said their cities haven't experienced a cyberattack while Dayton, Beavercreek, and Xenia hadn't ...

Posted on 22 May 2019 | 1:33 pm

Online Privacy Is a Right, Not a Luxury

In security circles, it's often said that "if it's free, you're the product." I think it's more accurate to say that if you can't afford to pay, then you're the product.

Posted on 22 May 2019 | 1:26 pm

Report: Air Force Launches Probe Into Navy-Linked Cyber Intrusion

A memo says the U.S. Air Force reported intrusion of its network using ... possible involvement in the cyber attack, Air Force Times reported Tuesday.

Posted on 22 May 2019 | 1:26 pm

Report: Air Force Launches Probe Into Navy-Linked Cyber Intrusion

A memo says the U.S. Air Force reported intrusion of its network using malware and is investigating the U.S. Navy with regard to the latter's possible ...

Posted on 22 May 2019 | 1:22 pm

Proving the Value of Security Awareness with Metrics that 'Deserve More'

For example, if malware incidents are decreased by 25%, and there is an average cost associated to malware incidents, you can calculate an ...

Posted on 22 May 2019 | 1:22 pm

Proving the Value of Security Awareness with Metrics that 'Deserve More'

In this case, you need to measure actual security behaviors or the indications of those behaviors. It is irrelevant if people can recite the criteria for a ...

Posted on 22 May 2019 | 1:22 pm

HIV Data Breach; Havana Brain Attacks Solved? 'Biohacker' Under Investigation

The University of California San Diego (UCSD) is dragging its feet when it comes to informing women in an HIV/AIDS study that their confidential data ...

Posted on 22 May 2019 | 1:11 pm

Gov. DeSantis orders security review following hacked 2016 election

TALLAHASSEE, Fla. — Describing it as a "top priority," Gov. Ron DeSantis on Wednesday directed Florida Secretary of State Laurel Lee to ...

Posted on 22 May 2019 | 1:02 pm

Yubikey, The Weaponization Thereof

Probably the main strength of the YubiKey as an attack tool is that it looks like ... This is a Security Bloggers Network syndicated blog from Infosecurity.

Posted on 22 May 2019 | 12:59 pm

Bitcoin hackers hold city of Baltimore to ransom

Mayor Young who had been in office less than a month when the cyber attack was launched, said the city is working with the FBI and other experts to ...

Posted on 22 May 2019 | 12:45 pm

Memo Reveals US Navy's Spying On Gallagher Defense Was Much Worse Than Initially Reported

A new memo reveals prosecutors in the case of Navy SEAL Eddie Gallagher, who was accused of war crimes, used malware to spy on a number of ...

Posted on 22 May 2019 | 12:44 pm

Patch now! Why the BlueKeep vulnerability is a big deal

This means that future exploits might use it to spread malware within or outside of networks in similar ways to what was seen with WannaCryptor.

Posted on 22 May 2019 | 12:44 pm

GDPR: One Year Down…Now What?

On May 25, 2018 the General Data Protection Regulation came into law for European Union countries, created to protect data relating to E.U. citizens, ensuring the right to know what is being stored, where and why. 

read more

Posted on 22 May 2019 | 12:38 pm

Thangrycat: a deadly Cisco vulnerability named after an emoji

... module, which allows malicious software to run undetectably and makes it virtually impossible to eliminate malware once it has been installed.

Posted on 22 May 2019 | 12:38 pm

Following Russian hacking, Florida Gov. Ron DeSantis orders statewide election review

The letter follows the revelation that Russian hackers succeeded in breaching the elections systems of two Florida counties during the 2016 ...

Posted on 22 May 2019 | 12:37 pm

IoT cyberattacks could cost UK economy £1bn per year

Respondents who had suffered an IoT-related cyber attack estimated an average cost to their business of £244,000 over the last year, according to the ...

Posted on 22 May 2019 | 12:37 pm

Google is facing its first GDPR probe from Irish privacy regulators

Google is the subject of its first GDPR probe from Ireland's Data Protection Commissioner (DCP), Reuters is reporting. It's the first major standoff ...

Posted on 22 May 2019 | 12:36 pm

#QuestionsForKeisha: Atlanta Mayor Talks Gentrification, Atlanta Child Murders, Potholes

So this is a new platform for us, as you mentioned it was launched last year. Last year, we had a cyber attack, and part of our recovery from that cyber ...

Posted on 22 May 2019 | 12:31 pm

US political parties are still making basic cybersecurity blunders

The news: Researchers at cybersecurity firm SecurityScorecard spent the first quarter of 2019 analyzing the anti-hacking defenses of the parties, ...

Posted on 22 May 2019 | 12:30 pm

Theochari: Green investments crowd out cyber security

With the amount of available capital still limited, shipping companies will prioritise investments in environmental technologies over cyber security, ...

Posted on 22 May 2019 | 12:29 pm

Gov. DeSantis Orders A Review Of State Elections Security After Two Florida Counties Were Hacked

DeSantis and other officials have said the 2016 hacking did not involve “manipulation” of voting results. The hackers accessed voter-information files, ...

Posted on 22 May 2019 | 12:26 pm

Truecaller Denies Hack As User Info Emerges On Dark Web

Data on global users are going for as much as 25000 Euros. ... outlet it's not likely that such a large amount of data wasn't accessed via a data breach.

Posted on 22 May 2019 | 12:05 pm

EU regulator launches probe into Google over data privacy

Ireland's data privacy watchdog on Wednesday announced the launch of an inquiry into Google over the tech giant's collection of data when it comes ...

Posted on 22 May 2019 | 11:59 am

Mozilla Firefox 67 Is Now Available for All Supported Ubuntu Linux Releases

We recommend updating your Ubuntu PCs to Firefox 67 as soon as ... so if you're using a different Linux OS make sure you check the repositories for ...

Posted on 22 May 2019 | 11:52 am

Black Hat USA Reveals First 2019 Briefings: WhatsApp, 2020 Election, Boeing, Apple XS, and More

SAN FRANCISCO, May 22, 2019 (GLOBE NEWSWIRE) -- Today, Black Hat, the world's leading producer of information security events, announces its ...

Posted on 22 May 2019 | 11:52 am

Android and iOS devices impacted by new sensor calibration attack

SensorID technique can track users across apps and websites using sensor calibration data.

Posted on 22 May 2019 | 11:44 am

Hunters.AI Raises $5.4M Seed Round to Equip Cybersecurity Teams with Autonomous Threat ...

It then connects those digital traces to quickly identify and isolate attacks, and provide high ... But Hunters autonomous hunting technology did find it.

Posted on 22 May 2019 | 11:41 am

Online threat prompts increased security at local high school

Police are investigating an online threat made this morning toward a local high school. Officers from Corpus Christi Independent School District Police ...

Posted on 22 May 2019 | 11:37 am

The Impact of Microsoft's Latest Legacy Patch and Basic RDP Security

Indeed, the hypothetical exploit reads similar to the WannaCry attack from ... The University of Berkeley Information Security and Policy stresses the ...

Posted on 22 May 2019 | 11:35 am

Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research

Researchers at Cambridge University have determined that attackers could use the built-in motion sensors in mobile devices to generate a unique device fingerprint.

read more

Posted on 22 May 2019 | 11:31 am

Practical tips for managing breaches and breach notification | GDPR Periscope series

It's only a few days until the first anniversary of the GDPR coming into force, so what better time to give your data breach response procedure a health ...

Posted on 22 May 2019 | 11:30 am

House Homeland chair: White House focus on border dilutes DHS cyber efforts

Acting DHS chief Kevin McAleenan today touted the president's budget request for cyber activities, but House Homeland Security Chairman Bennie ...

Posted on 22 May 2019 | 11:25 am

TalkTalk Fails To Inform Customers, After Breach Data Found Online

The personal details of 4,500 TalkTalk customers have been discovered online after it was leaked as part of the hugely damaging data breach of the ...

Posted on 22 May 2019 | 11:18 am

Comforte AG debuts data security solution for payments industry

Data security provider Comforte AG has introduced a new data security ... The comforte data security solution makes this possible by protecting data ...

Posted on 22 May 2019 | 11:18 am

43% of Cyber Attacks Still Target Small Business while Ransomware Stays On the Rise

And cyber attacks on small businesses represent the largest share of all the attacks in the report. The disparity highlights a lack of resources and ...

Posted on 22 May 2019 | 11:07 am

Kaspersky Lab expands into East Africa as it opens office in Rwanda

Russian multinational cybersecurity and antivirus provider, Kaspersky Lab has announced plans to expand into one of Africa's fastest-growing ...

Posted on 22 May 2019 | 11:07 am

What every customer should do after a company has a data breach

Note: This article will walk you through what consumers should do after a company has a data breach. If you're a business owner who has been ...

Posted on 22 May 2019 | 11:04 am

43% of Cyber Attacks Still Target Small Business while Ransomware Stays On the Rise

And cyber attacks on small businesses represent the largest share of all the attacks in the report. The disparity highlights a lack of resources and ...

Posted on 22 May 2019 | 11:01 am

Hacker Reveals Breach Exposing Flight Histories of Netanyahu Family, Other Israeli Officials

The data can be obtained online via a technique known as SQL injection, in which code is added to a web form, making it possible to access or alter ...

Posted on 22 May 2019 | 10:57 am

KPMG and PwC launch arms race for cyber security talent

The world's biggest professional services firms have launched an arms race for talent in the cyber security sector, according to new research from the ...

Posted on 22 May 2019 | 10:56 am

KPMG and PwC launch arms race for cyber security talent

The world's biggest professional services firms have launched an arms race for talent in the cyber security sector, according to new research from the ...

Posted on 22 May 2019 | 10:56 am

Cryptography is Changing Fast, and Cyber Security Pros Are Best Advised to Stay Ahead of the ...

The rise of quantum computing has made that threat anything but theoretical, and has given hackers a tool for breaking through cryptographic layers ...

Posted on 22 May 2019 | 10:56 am

Global Web Security Market Forecast to 2023

The web security market is growing faster than was foreseen just a couple of years ago. In 2018, the market grew 11.9% to $2.64 billion. 2018 will ...

Posted on 22 May 2019 | 10:56 am

Global Web Security Market Forecast to 2023

The web security market is growing faster than was foreseen just a couple of years ago. In 2018, the market grew 11.9% to $2.64 billion. 2018 will ...

Posted on 22 May 2019 | 10:56 am

Cryptography is Changing Fast, and Cyber Security Pros Are Best Advised to Stay Ahead of the ...

Sometimes the world of cybersecurity seems to be upside down, and this is one of those times. In particular, one of the technologies that has long ...

Posted on 22 May 2019 | 10:56 am

TalkTalk data breach: “Apology not enough” for failing to notify 4500 customers

Telecommunications firm TalkTalk has been slammed by cybersecurity experts for failing to notify around 4,500 of its customers that their personal ...

Posted on 22 May 2019 | 10:56 am

Global Web Security Market Forecast to 2023

Web security is a network-based software system that protects web users against web-based malware and targeted cyber attacks. Email is still the ...

Posted on 22 May 2019 | 10:56 am

What every customer should do after a company has a data breach

You certainly wouldn't be alone, as 70% of surveyed people said they would stop following a company after a data breach. However, if you're only ...

Posted on 22 May 2019 | 10:56 am

Arrowpoint Asset Management Has Cut Logmein (Call) (LOGM) Stake By $208.32 Million; Clovis ...

Some Historical LOGM News: 10/04/2018 – LogMeIn Announces LastPass Integration Partnership with OneLogin; 09/04/2018 – LogMeIn Inc.: Jesse ...

Posted on 22 May 2019 | 10:55 am

Critical Vulnerabilities Plague South Korean ActiveX Controls

Tens of very basic but Critical vulnerabilities were found in 10 South Korean ActiveX controls as part of a short research project, security researchers with Risk Based Security say. 

read more

Posted on 22 May 2019 | 10:47 am

Russia plotting to hack European elections, Brussels warns

Hundreds of millions of Europeans will elect a fresh crop of MEPs in this week's elections, but EU officials and diplomats believe there is a severe risk ...

Posted on 22 May 2019 | 10:47 am

BIMCO develops cyber security clause

BIMCO's Documentary Committee has agreed a new standard cyber security charterparty clause that requires the parties to implement cyber security ...

Posted on 22 May 2019 | 10:44 am

LinkedIn Allowed TLS Certificate to Expire—Again

Microsoft-owned social media giant LinkedIn has once again put user data and privacy at risk by allowing a TLS certificate to expire.

read more

Posted on 22 May 2019 | 10:43 am

Flooding the market: Global DDoS attacks nearly double in Q1

The number of distributed denial-of-service (DDoS) attacks detected worldwide increased by 84% during the first three months of the year, according ...

Posted on 22 May 2019 | 10:42 am

Magecart Skimmer Poses as Payment Service Provider

The skimmer used in a recently discovered Magecart attack on a Magento-based e-commerce website was posing as a payment service provider via a rogue iframe, Malwarebytes reports.

read more

Posted on 22 May 2019 | 10:34 am

One Year On, EU Has 145,000 Data Law Complaints

One year after the entry into force of landmark EU rules to better protect personal data, nearly 145,000 complaints have been registered, an initial assessment revealed on Wednesday.

read more

Posted on 22 May 2019 | 10:22 am

Quicker enforcement action for some data breach offenders: Singapore privacy watchdog | Video

Quicker enforcement action could be taken against some companies that breach the Personal Data Protection Act (PDPA), Singapore's data privacy ...

Posted on 22 May 2019 | 10:22 am

No Root Password for 20% of Popular Docker Containers

An analysis of 1,000 popular Docker containers revealed that nearly 20% of them have nulled root passwords, Kenna Security says. 

read more

Posted on 22 May 2019 | 10:14 am

Sinkhole patching problem means one lane still closed on 29 North

The Virginia Department of Transportation says the asphalt pavement that was used to patch Tuesday's sinkhole did not set correctly and is too soft to ...

Posted on 22 May 2019 | 10:01 am

Verizon's data breach report: What the numbers say

Data breach, yawn. Those two little words that occur so frequently in the media and will have you switching off. Last week, Verizon released its 2019 ...

Posted on 22 May 2019 | 10:00 am

Windows Zero-Day Drops on Twitter, Developer Promises 4 More

A Windows zero-day exploit dropped by developer SandboxEscaper would allow local privilege-escalation (LPE), by importing legacy tasks from other ...

Posted on 22 May 2019 | 9:56 am

Apple Pledges to Be 'Clearer and More Upfront' With iPhone Users About Battery Health and ...

... if Apple's OS upgrades throttled older phones, Apple vehemently denied it. .... The patch notes never mentioned throttling of the CPU, only "battery ...

Posted on 22 May 2019 | 9:39 am

Flaw Exposes Mitsubishi PLCs to Remote DoS Attacks

Researchers discovered that some programmable logic controllers (PLCs) made by Japanese electrical equipment maker Mitsubishi Electric are affected by a serious denial-of-service (DoS) vulnerability.

read more

Posted on 22 May 2019 | 9:20 am

IGEL Developing Linux Distro For Windows Virtual Desktop Users

In February, Amazon Web Services chose IGEL to provide the first Linux OS for connecting to Amazon WorkSpaces, the cloud leader's VDI service.

Posted on 22 May 2019 | 8:45 am

Hacking and Cyber Security Certification Training Bundle 2019 (10 Courses)

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the way of cybercrime is a small army of ethical hackers. These cybersecurity experts are employed to find weaknesses before they can be exploited. It's a lucrative career, and anyone can find work

Posted on 22 May 2019 | 8:30 am

Hunters.AI Emerges From Stealth With $5.4M in Seed Funding

Hunters.AI, an Israel-based company specializing in autonomous threat hunting, on Wednesday emerged from stealth mode and announced that it raised $5.4 million in seed funding from YL Ventures and Blumberg Capital.

read more

Posted on 22 May 2019 | 8:25 am

4 Programming Languages Every Cyber Security Professional Must Know

SQL injection attacks are one of the widely used hacking technique. Hackers look for SQL vulnerability and then exploit it. So, a cybersecurity ...

Posted on 22 May 2019 | 7:54 am

EU Adopts Powers to Respond to Cyberattacks

The European Union on Friday adopted powers to punish those outside the bloc who launch cyberattacks that cripple hospitals and banks, sway elections and steal company secrets or funds.

read more

Posted on 22 May 2019 | 7:19 am

New Windows 10 Zero-Day Vulnerability Found: What You Need to Know

It's unknown when, or even if, Microsoft will respond with a patch, though the company's next Patch Tuesday is scheduled for June 11. ZombieLoad ...

Posted on 22 May 2019 | 7:00 am

New Windows 10 Vulnerability Could Let Hackers Gain Full Access to Your PC

It's unknown when, or even if, Microsoft will respond with a patch, though the company's next Patch Tuesday is scheduled for June 11. Best Free ...

Posted on 22 May 2019 | 6:48 am

TalkTalk admits new failings in 2015 data breach notification

... its database vulnerable to a SQL injection attack after failing to apply a fix for a software bug that had been available for more than three years.

Posted on 22 May 2019 | 5:58 am

Network and Web Security Market forecast to 2022 examined in new market research report

The various network and web threats are computer viruses, hacker attacks, data theft, denial of services (DoS), SQL injection, cross site scripting, data ...

Posted on 22 May 2019 | 5:53 am

This New Windows 10 Threat Can Read All Your Files

... exploits for the Windows operating system has struck again; this time just days after the latest Patch Tuesday security updates were rolled out.

Posted on 22 May 2019 | 5:15 am

Global Antivirus Software Market 2019 Symantec, McAfee, Trend Micro, AVG

The Report Global Antivirus Software Market 2019 by Market.biz manufacturers, Regions, type, and Application, Forecast to 2024 is thorough analysis ...

Posted on 22 May 2019 | 5:14 am

New Windows 10 Threat Can Read All Your Files -- No Microsoft Patch Expected Before June 11

This local privilege escalation (LPE) exploit is the fifth in a series of ... It also works, according to Dormann, on a 64-bit Windows 10 computer if “you ...

Posted on 22 May 2019 | 5:07 am

Most hackers for hire are scammers, research shows

Hackers for hire are a bunch of swindlers, according to research published last ... Such services offer targeted attacks that remain a potent threat, the ...

Posted on 22 May 2019 | 4:45 am

Windows 7 patch warning: Antivirus clash causing PCs to freeze

PATCH TUESDAY. All Windows users affected by two new 'critical' flaws. Updated: One of the patches is being reviewed by Microsoft after reports ...

Posted on 22 May 2019 | 4:28 am

Windows 7 patch warning: Antivirus clash causing PCs to freeze

In a repeat of April's Windows 7 update clashes with multiple antivirus products, the May 2019 Windows 7 updates are causing new problems for users ...

Posted on 22 May 2019 | 4:22 am

ISP TalkTalk Failed to Inform 4545 Customers of 2015 Data Breach

The attack resulted from a combined Distributed Denial of Service (DDoS) assault and an SQL Injection exploit against TalkTalk's site (here), which ...

Posted on 22 May 2019 | 4:11 am

Windows 10 1803 1809 updates KB4499183 KB4497934 released

The two preview updates for Windows 10, the official release will be on the June 2019 Patch Tuesday, June 11, 2019, introduce new features and fix ...

Posted on 22 May 2019 | 3:48 am

Nearly a Fifth of UK Public Sector Organisations Reported Over 1000 Cyberattacks in 2018 ...

This may explain why the most common defences in place were firewalls (98 percent), antivirus software (98 percent), and malware protection (96 ...

Posted on 22 May 2019 | 3:26 am

Xbox Insider Hub doesn't work [FIXED by EXPERTS]

In addition, make sure that your antivirus or firewall aren't interfering with the Xbox app. If that doesn't work, try resetting Xbox Insider Hub.

Posted on 22 May 2019 | 3:12 am

Researcher Drops Windows 10 Zero-Day Exploit

A researcher has made public technical details, a video and proof-of-concept (PoC) exploit code for an unpatched local privilege escalation (LPE) vulnerability affecting Windows.

read more

Posted on 22 May 2019 | 2:58 am

Google Stored G Suite Users' Passwords in Plain-Text for 14 Years

After Facebook and Twitter, Google becomes the latest technology giant to have accidentally stored its users' passwords unprotected in plaintext on its servers—meaning any Google employee who has access to the servers could have read them. In a blog post published Tuesday, Google revealed that its G Suite platform mistakenly stored unhashed passwords of some of its enterprise users on

Posted on 22 May 2019 | 2:49 am

Antivirus Software for Business Market 2019 | Outlook, Growth By Top Companies, Regions, Types ...

The research study on the Antivirus Software for Business market projects this industry to garner substantial proceeds by the end of the projected ...

Posted on 22 May 2019 | 2:32 am

Enterprise Antivirus Services Market with Report In Depth Industry Analysis on Trends, Growth ...

A comprehensive research study on Enterprise Antivirus Services market available at MarketStudyReport.com provides insights into the market size ...

Posted on 22 May 2019 | 2:32 am

Enterprise Antivirus Software Market Growth, Analysis of Key Players, Trends, Drivers

The Enterprise Antivirus Software market research added by Market Study Report, LLC, presents a detailed analysis of the influential trends prevailing ...

Posted on 22 May 2019 | 2:30 am

Software-update: 1Password 7.2.6 / 1.15.2

1Password is er hier een van, en is beschikbaar als webapplicatie en als app op verschillende platforms, zoals Android, iOS, macOS en Windows.

Posted on 22 May 2019 | 2:27 am

PoC Exploit For Unpatched Windows 10 Zero-Day Flaw Published Online

An anonymous hacker with an online alias "SandboxEscaper" today released proof-of-concept (PoC) exploit code for a new zero-day vulnerability affecting Windows 10 operating system—that's his/her 5th publicly disclosed Windows zero-day exploit [1, 2, 3] in less than a year. Published on GitHub, the new Windows 10 zero-day vulnerability is a privilege escalation issue that could allow a local

Posted on 22 May 2019 | 1:46 am

A guide to choosing the best antivirus solution for your business

Searching for the best antivirus or cybersecurity solution for your business? With so many options on the market, and so many factors to take into ...

Posted on 22 May 2019 | 1:11 am

Windows 10 Update Bugs, Latest News 2019: How to Fix Reboot Issues Caused by Latest Patch ...

Of course, to completely dodge this headache, simply opt to not update to the May Patch Tuesday and wait it out after Microsoft has completely fixed ...

Posted on 22 May 2019 | 1:00 am

Global Handheld Parking Charge Machine Market Outlook 2019: Keypass, Chainway, Sunway ...

The information with respect to a portion of the predominant players Keypass, Chainway, Sunway, Cardlan, Kingdy, Realand, Jin Hao, Jilian is ...

Posted on 21 May 2019 | 11:19 pm

Global Hand-Held Charging Machine Market Outlook 2019: Keypass, Chainway, Sunway, Cardlan ...

The report also has leading and major players Keypass, Chainway, Sunway, Cardlan, Kingdy, Realand, Jin Hao, Jilian of the global market.

Posted on 21 May 2019 | 11:18 pm

Windows 10 zero-day exploit code released online

Security researcher 'SandboxEscaper' returns with new Windows LPE zero-day.

Posted on 21 May 2019 | 8:23 pm

Windows 10 zero-day exploit code released online

Microsoft patched most of these issues within one or two months after they were made public. Microsoft's next Patch Tuesday is scheduled for June 11.

Posted on 21 May 2019 | 8:18 pm

Safeguarding Utah's water systems against threats

Safeguarding Utah's water systems against threats ... and cutting all access from former employees can help mitigate the risk of hacking, he said.

Posted on 21 May 2019 | 7:02 pm

Google says it stored some G Suite passwords in unhashed form for 14 years

G Suite passwords were encrypted when stored on disk, so, at least, they weren't stored in plaintext.

Posted on 21 May 2019 | 4:17 pm

Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005

Google on Tuesday said that some passwords for its G Suite customers were stored in an unhashed format since 2005.

read more

Posted on 21 May 2019 | 4:15 pm

Firefox Now Has Fingerprinting and Crypto-mining Protection

Mozilla this week released Firefox 67 to the stable channel with improved protection against tracking and with fingerprinting and crypto-mining protection capabilities. 

read more

Posted on 21 May 2019 | 3:33 pm

Fending off Zombieload attacks will crush your performance

To fully protect yourself from potential Zombieload attacks, vendors and early benchmarks show you'll face performance losses of up to 40%.

Posted on 21 May 2019 | 3:24 pm

Attack Combines Phishing, Steganography, PowerShell to Deliver Malware

URLZone Morphs Into a Downloader for Ursnif

Researchers have discovered a malware campaign targeting Japan and combining phishing, steganography, PowerShell, and the URLZone and Ursnif malwares.

read more

Posted on 21 May 2019 | 1:47 pm

First official version of Tor Browser for Android released on the Play Store

After eight months of alpha testing, Tor Browser for Android is now ready for rollout.

Posted on 21 May 2019 | 1:21 pm

Mozilla Releases Security Updates for Firefox, Thunderbird

Original release date: May 21, 2019 | Last revised: May 22, 2019

Mozilla has released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisories for Firefox 67, Firefox ESR 60.7, and Thunderbird 60.7 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 21 May 2019 | 12:36 pm

Ohio school sends students home because of Trickbot malware infection

TrickBot infections impacted, PC fleet, phone and HVAC systems.

Posted on 21 May 2019 | 12:34 pm

Microsoft Releases Windows Updates to Fix GOV.UK Connection Issues

A week later and reports have been piling up of those who updated with the collection of "Patch Tuesday" fixes suffering with systems that get stuck at ...

Posted on 21 May 2019 | 11:30 am

Guardicore Raises $60 Million in Series C Funding

Data center and cloud security company Guardicore on Tuesday announced that it has secured $60 million in Series C funding round. To date, the company has raised $110 million in funding.

read more

Posted on 21 May 2019 | 11:13 am

Satan Ransomware Expands Portfolio of Exploits

A recently observed Satan ransomware variant has added exploits to its portfolio and is looking to compromise more machines by targeting additional vulnerabilities.

read more

Posted on 21 May 2019 | 11:03 am

Poor Security Hygiene Found Across Almost All Political Parties in US, Europe

Cybersecurity of Major U.S. and European Political Parties Found Wanting

read more

Posted on 21 May 2019 | 10:52 am

Microsoft Adds Live Response Capabilities to Defender ATP

In an effort to to help security teams more easily investigate incidents on remote machines, Microsoft has added live response capabilities to its Microsoft Defender ATP offering.

read more

Posted on 21 May 2019 | 9:53 am

Identity Management Firm Auth0 Raises $103 Million

Identity-as-a-Service (IDaaS) company Auth0 this week announced the close of a $103 million Series E funding round led by Sapphire Ventures, at a valuation of more than $1 billion.

read more

Posted on 21 May 2019 | 9:05 am

Core Elastic Stack Security Features Now Available For Free Users As Well

Elastic, the company behind the most widely used enterprise search engine ElasticSearch and the Elastic Stack, today announced that it has decided to make core security features of the Elastic Stack free and accessible to all users. ELK Stack or Elastic Stack is a collection of three powerful open source projects—Elasticsearch, Logstash, and Kibana—that many large and small companies are

Posted on 21 May 2019 | 9:03 am

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who can afford a multi-product security stack and a skilled security team to operate it. This implies a grave risk to all organizations who are not part of this group, since the modern threat landscape applies to all, regardless of size and vertical. What is

Posted on 21 May 2019 | 8:46 am

US Tech Giants Google, Intel, Qualcomm, Broadcom Break Up With Huawei

Google has reportedly suspended all businesses with the world's second-biggest smartphone maker, Huawei, and revoked its Android license effective immediately—a move that will have a drastic impact on Huawei devices across the globe. Revoking Android license means Huawei future smartphones will no longer have access to Android updates and apps like Gmail or the Play Store, as well as Google

Posted on 21 May 2019 | 2:40 am

Some Elasticsearch security features are now free for everyone

Company makes TLS support and fine-grained user/role management free for everyone.

Posted on 21 May 2019 | 12:34 am

Global Industrial Cybersecurity Solution Market 2019 Overview by Products Type: Antivirus ...

Global Industrial Cybersecurity Solution Market 2019 Overview by Products Type: Antivirus, Firewall, SCADA Encryption, Data Loss Prevention (DLP).

Posted on 21 May 2019 | 12:26 am

Root account misconfigurations found in 20% of top 1,000 Docker containers

Issue similar to Alpine Linux's CVE-2019-5021 impacts 194 other Docker images.

Posted on 20 May 2019 | 11:15 pm

Google research: Most hacker-for-hire services are frauds

Survey of 27 hacker-for-hire services found that only five launched attacks against victims.

Posted on 20 May 2019 | 5:11 pm

Staying Cyber Safe During Memorial Day

Original release date: May 20, 2019

As Memorial Day approaches, the Cybersecurity and Infrastructure Security Agency (CISA) reminds users to stay cyber safe. Users should be cautious of potential scams, such as unsolicited emails that contain malicious links or attachments with malware. Users should also be aware of the risks associated with online shopping and traveling with mobile devices.

CISA recommends users review the following tips for information on how to guard against these risks:


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 20 May 2019 | 3:10 pm

Google changes how the Escape key is handled in Chrome to fight popup ads

Google Chrome v76 is getting a new security feature to fight popup spam.

Posted on 20 May 2019 | 12:02 pm

Security researchers discover Linux version of Winnti malware

Winnti Linux variant used in 2015 in the hack of a Vietnamese gaming company.

Posted on 19 May 2019 | 11:15 pm

Company behind LeakedSource pleads guilty in Canada

LeakedSource sold data on over 3.1 billion accounts, made CAN$247,000 (US$183,000).

Posted on 19 May 2019 | 11:49 am

Account Hijacking Forum OGusers Hacked

Ogusers[.]com -- a forum popular among people involved in hijacking online accounts and conducting SIM swapping attacks to seize control over victims' phone numbers -- has itself been hacked, exposing the email addresses, hashed passwords, IP addresses and private messages for nearly 113,000 forum users.

Posted on 18 May 2019 | 8:44 am

Faulty database script brings Salesforce to its knees

Faulty production script gave users access to all their company's Salesforce data.

Posted on 17 May 2019 | 6:51 pm

Hackers Breach Stack Overflow Q&A Site, Some Users' Data Exposed

Note: We have updated this story to reflect new information after Stack Overflow changed its original announcement and shared more details on the security incident. Stack Overflow, one of the largest question and answer site for programmers, revealed today that unknown hackers managed to exploit a bug in its development tier and then almost a week after they gained unauthorized access to its

Posted on 17 May 2019 | 3:44 pm

Stack Overflow hacker went undetected for a week

Stack Overflow now says hacker might have also accessed user data.

Posted on 17 May 2019 | 1:49 pm

Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016

The German software company behind TeamViewer, one of the most popular software in the world that allows users to access and share their desktops remotely, was reportedly compromised in 2016, the German newspaper Der Spiegel revealed today. TeamViewer is popular remote-support software that allows you to securely share your desktop or take full control of other's PC over the Internet from

Posted on 17 May 2019 | 1:06 pm

Chinese cyberspies breached TeamViewer in 2016

TeamViewer said it detected and stopped the attack before hackers could do any damage.

Posted on 17 May 2019 | 11:25 am

MDS 'Zombieload' attacks against Intel CPUs: What's your patch status?

Where to get updates for Zombieland, RIDL, Fallout, and all the new Intel MDS vulnerabilities.

Posted on 17 May 2019 | 2:28 am

How to test MDS (Zombieload) patch status on Windows systems

PowerShell script tells you if your Windows OS is safe from MDS attacks.

Posted on 17 May 2019 | 2:26 am

Facebook bans Israel's Archimedes Group over fake political activity, election disruption

The corporation has been accused of using fake accounts to influence political campaigns.

Posted on 17 May 2019 | 2:19 am

Feds Target $100M ‘GozNym’ Cybercrime Network

Law enforcement agencies in the United States and Europe today unsealed charges against 11 alleged members of the GozNym malware network, an international cybercriminal syndicate suspected of stealing $100 million from more than 41,000 victims with the help of a stealthy banking trojan by the same name.

Posted on 16 May 2019 | 5:05 pm

Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released security updates to address a remote code execution vulnerability in the following in-support and out-of-support operating systems:

A remote attacker could exploit this vulnerability to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Microsoft Security Advisory and Microsoft Customer Guidance for CVE-2019-0708 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 16 May 2019 | 10:51 am

'GozNym' Banking Malware Gang Dismantled by International Law Enforcement

In a joint effort by several law enforcement agencies from 6 different countries, officials have dismantled a major global organized cybercrime network behind GozNym banking malware. GozNym banking malware is responsible for stealing nearly $100 million from over 41,000 victims across the globe, primarily in the United States and Europe, for years. <!-- adsense --> GozNym was created by

Posted on 16 May 2019 | 9:08 am

Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement

A team of security researchers at Microsoft discovered a potentially serious vulnerability in the Bluetooth-supported version of Google's Titan Security Keys that could not be patched with a software update. However, users do not need to worry as Google has announced to offer a free replacement for the affected Titan Security Key dongles. In a security advisory published Wednesday, Google

Posted on 16 May 2019 | 5:55 am

A Tough Week for IP Address Scammers

In the early days of the Internet, there was a period when Internet Protocol 4 (IPv4) addresses (e.g. 4.4.4.4) were given out like cotton candy to anyone who asked. But these days companies are queuing up to obtain new IP space from the various regional registries that periodically dole out the prized digits. With the value of a single IP hovering between $15-$25, those registries are now fighting a wave of shady brokers who specialize in securing new IP address blocks under false pretenses and then reselling to spammers. Here's the story of one broker who fought back in the courts, and lost spectacularly. On May 14, South Carolina U.S. Attorney Sherri Lydon filed criminal wire fraud charges against Amir Golestan, alleging he and his Charleston, S.C. based company Micfo LLC orchestrated an elaborate network of phony companies and aliases to gather more than 735,000 IPs from the American Registry for Internet Numbers (ARIN), a nonprofit which oversees IP addresses assigned to entities in the U.S., Canada, and parts of the Caribbean.

Posted on 15 May 2019 | 5:09 pm

Cisco Releases Security Updates for Multiple Products

Original release date: May 15, 2019

Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Cisco Security Advisories page and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 15 May 2019 | 12:43 pm

New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011

Academic researchers today disclosed details of the newest class of speculative execution side-channel vulnerabilities in Intel processors that impacts all modern chips, including the chips used in Apple devices. After the discovery of Spectre and Meltdown processor vulnerabilities earlier last year that put practically every computer in the world at risk, different classes of Spectre and

Posted on 14 May 2019 | 3:20 pm

VMware Releases Security Updates

Original release date: May 14, 2019

VMware has released security updates to address vulnerabilities in vCenter Server, ESXi, Workstation, and Fusion. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review VMware Security Advisories VMSA-2019-0007 and VMSA-2019-0008 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 14 May 2019 | 2:46 pm

Microsoft Releases Patches For A Critical 'Wormable Flaw' and 78 Other Issues

It's Patch Tuesday—the day when Microsoft releases monthly security updates for its software. Microsoft has software updates to address a total of 79 CVE-listed vulnerabilities in its Windows operating systems and other products, including a critical wormable flaw that can propagate malware from computer to computer without requiring users' interaction. Out of 79 vulnerabilities, 18 issues

Posted on 14 May 2019 | 1:31 pm

Adobe Releases Security Updates

Original release date: May 14, 2019

Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Adobe Security Bulletins APSB19-29, APSB19-26, and APSB19-18 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 14 May 2019 | 1:13 pm

Microsoft Releases May 2019 Security Updates

Original release date: May 14, 2019 | Last revised: May 15, 2019

Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Microsoft’s Security Update Guide and May 2019 Deployment Information and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 14 May 2019 | 1:11 pm

Intel Releases Security Updates, Mitigations for Multiple Products

Original release date: May 14, 2019 | Last revised: May 15, 2019

Intel has released security updates and recommendations to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to gain an escalation of privileges on a previously infected machine.
 
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Intel Product Security Center Advisories page, apply the necessary mitigations, and refer to vendors for appropriate patches, when available.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 14 May 2019 | 12:54 pm

Samba Releases Security Updates

Original release date: May 14, 2019

The Samba Team has released security updates to address a vulnerability in Samba. An attacker could exploit this vulnerability take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Samba Security Announcement for CVE-2018-16860 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Posted on 14 May 2019 | 12:29 pm

Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003

Microsoft today is taking the unusual step of releasing security updates for unsupported but still widely-used Windows operating systems like XP and Windows 2003, citing the discovery of a "wormable" flaw that the company says could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017. The vulnerability (CVE-2019-0709) resides in the "remote desktop services" component built into supported versions of Windows, including Windows 7, Windows Server 2008 R2, and Windows Server 2008. It also is present in computers powered by Windows XP and Windows 2003, operating systems for which Microsoft long ago stopped shipping security updates.

Posted on 14 May 2019 | 12:11 pm

Adobe Releases Critical Patches for Flash, Acrobat Reader, and Media Encoder

Adobe today released its monthly software updates to patch a total of 87 security vulnerabilities in its Adobe Acrobat and Reader, Flash Player and Media Encoder, most of which could lead to arbitrary code execution attacks or worse. None of the flaws patched this month in Adobe products has been found exploited in the wild. Out of 87 total flaws, a whopping number of vulnerabilities (i.e.,

Posted on 14 May 2019 | 10:44 am

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Researchers have discovered a severe vulnerability in Cisco products that could allow attackers to implant persistent backdoor on wide range devices used in enterprises and government networks, including routers, switches, and firewalls. Dubbed Thrangrycat or 😾😾😾, the vulnerability, discovered by researchers from the security firm Red Balloon and identified as CVE-2019-1649, affects

Posted on 14 May 2019 | 3:54 am

Cryptocurrency Hacks Still Growing — What Does That Mean for the Industry?

Though once synonymous with underground networks and black hat hackers, bitcoin and other cryptocurrencies have gone mainstream over the past two years. In 2017, we saw the skyrocket of bitcoin to an all-time high of close to $20,000 followed by a significant decline the following year. But beyond the ups and downs in the market for the world's largest cryptocurrency is a much more sinister

Posted on 14 May 2019 | 3:46 am

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance malware on a few "selected" smartphones by simply calling the targeted phone numbers over Whatsapp audio call. Discovered, weaponized and then sold by the Israeli company NSO Group that produces the most advanced mobile spyware on the planet, the WhatsApp exploit installs

Posted on 14 May 2019 | 1:10 am

U.S. Charges 9 'SIM Swapping' Attackers For Stealing $2.5 Million

The U.S. Department of Justice today announced charges against nine individuals, 6 of which are members of a hacking group called "The Community" and other 3 are former employees of mobile phone providers who allegedly helped them steal roughly $2.5 million worth of the cryptocurrency using a method known as "SIM Swapping." According to the 15-count indictment unsealed today, five Americans

Posted on 10 May 2019 | 2:35 pm

Nine Charged in Alleged SIM Swapping Ring

Eight Americans and an Irishman have been charged with wire fraud this week for allegedly hijacking mobile phones through SIM-swapping, a form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target's phone number and diverting all texts and phone calls to the attacker's mobile device. From there, the attackers simply start requesting password reset links via text message for a variety of accounts tied to the hijacked phone number. All told, the government said this gang -- allegedly known to its members as "The Community" -- made more than $2.4 million stealing cryptocurrencies and extorting people for restoring access to social media accounts that were hijacked after a successful SIM-swap.

Posted on 10 May 2019 | 12:02 pm

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild. Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by North Korean government and known to launch cyber attacks against media

Posted on 10 May 2019 | 5:04 am

U.S. Charges Chinese Hacker For 2015 Anthem Data Breach

The United States Justice Department today announced charges against a Chinese hacker and his hacking team member for their alleged role in the 2015 massive data breach at health insurance giant Anthem and three other unnamed American companies. Fujie Wang (王 福 杰) and another hacker named John Doe with three different aliases—Deniel Jack, Kim Young, and Zhou Zhihong—are charged with four

Posted on 9 May 2019 | 4:46 pm

Ongoing Attack Stealing Credit Cards From Over A Hundred Shopping Sites

Researchers from Chinese cybersecurity firm Qihoo 360's NetLab have revealed details of an ongoing credit card hacking campaign that is currently stealing payment card information of customers visiting more than 105 e-commerce websites. While monitoring a malicious domain, www.magento-analytics[.]com, for over last seven months, researchers found that the attackers have been injecting

Posted on 8 May 2019 | 11:55 am

Unpatched Flaw in UC Browser Apps Could Let Hackers Launch Phishing Attacks

A bug hunter has discovered and publicly disclosed details of an unpatched browser address bar spoofing vulnerability that affects popular Chinese UC Browser and UC Browser Mini apps for Android. Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, specifically in China and India, with a massive user base of more than half a billion users worldwide.

Posted on 8 May 2019 | 8:41 am

Spam Trends: Top attachments and campaigns

Malware authors tend to prefer specific types of file attachments in their campaigns to distribute malicious content.  During our routine threat landscape monitoring in the last three months, we observed some interesting patterns about the attachment types that are being used in various campaigns. In February and March, we saw huge spam campaigns using ZIP […]

Posted on 8 May 2019 | 7:41 am

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

At the company's I/O 2019 developer conference, Google has announced its plan to introduce two new privacy and security-oriented features in the upcoming versions of its Chrome web browser. In an attempt to allow users to block online tracking, Google has announced two new features—Improved SameSite Cookies and Fingerprinting Protection—that will be previewed by Google in the Chrome web

Posted on 8 May 2019 | 4:49 am

Baltimore City Shuts Down Most of Its Servers After Ransomware Attack

For the second time in just over a year, the city of Baltimore has been hit by a ransomware attack, affecting its computer network and forcing officials to shut down a majority of its computer servers as a precaution. Ransomware works by encryption files and locking them up so users can't access them. The attackers then demand a ransom amount, typically in Bitcoin digital currency, in

Posted on 8 May 2019 | 3:08 am

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in what appears to be its largest hack to date. In a statement, Binance's CEO Changpeng Zhao said the company discovered a "large scale security breach" earlier on May 7, as a result of which hackers were able to steal roughly 7000 bitcoins, which worth 40.6

Posted on 8 May 2019 | 12:53 am

What’s Behind the Wolters Kluwer Tax Outage?

Early in the afternoon on Friday, May, 3, I asked a friend to relay a message to his security contact at CCH, the cloud-based tax division of the global information services firm Wolters Kluwer in the Netherlands. The message was that the same file directories containing new versions of CCH's software were open and writable by any anonymous user, and that there were suspicious files in those directories indicating some user(s) abused that access. Shortly after that report, the CCH file directory for tax software downloads was taken offline. As of this publication, several readers have reported outages affecting multiple CCH Web sites. These same readers reported being unable to access their clients' tax data in CCH's cloud because of the ongoing outages.

Posted on 7 May 2019 | 2:56 pm

Cynet's Free Incident Response Tool — Stop Active Attacks With Greater Visibility

The saying that there are two types of organizations, those that have gotten breached and those who have but just don't know it yet, has never been more relevant, making the sound incident response a required capability in any organization’s security stack. To assist in this critical mission, Cynet is launching a free IR tool offering, applicable to both IR service providers in need of a

Posted on 7 May 2019 | 1:56 pm

Feds Bust Up Dark Web Hub Wall Street Market

Federal investigators in the United States, Germany and the Netherlands announced today the arrest and charging of three German nationals and a Brazilian man as the alleged masterminds behind the Wall Street Market (WSM), one of the world's largest dark web bazaars that allowed vendors to sell illegal drugs, counterfeit goods and malware. Now, at least one former WSM administrator is reportedly trying to extort money from WSM vendors and buyers (supposedly including Yours Truly) -- in exchange for not publishing details of the transactions.

Posted on 3 May 2019 | 11:48 am

Credit Union Sues Fintech Giant Fiserv Over Security Claims

A Pennsylvania credit union is suing financial industry technology giant Fiserv, alleging that "baffling" security vulnerabilities in the company's software are "wreaking havoc" on its customers. The credit union said the investigation that fueled the lawsuit was prompted by a 2018 KrebsOnSecurity report about a glaring security weakness a Fiserv platform that exposed personal and financial details of customers across hundreds of bank Web sites.

Posted on 3 May 2019 | 9:30 am

Data: E-Retail Hacks More Lucrative Than Ever

For many years and until quite recently, credit card data stolen from online merchants has been worth far less in the cybercrime underground than cards pilfered from hacked brick-and-mortar stores. But new data suggests that over the past year, the economics of supply-and-demand have helped to double the average price fetched by card-not-present data, meaning cybercrooks now have far more incentive than ever to target e-commerce stores.

Posted on 30 April 2019 | 3:13 pm

Oracle Security Alert for CVE-2019-2725 - 26 Apr 2019

Posted on 26 April 2019 | 12:00 pm

Oracle Critical Patch Update Advisory - April 2019

Posted on 16 April 2019 | 2:30 pm

Discovering Hidden Twitter Amplification

As part of the Horizon 2020 SHERPA project, I’ve been studying adversarial attacks against smart information systems (systems that utilize a combination of big data and machine learning). Social networks fall into this category – they’re powered by recommendation algorithms (often based on machine learning techniques) that process large amounts of data in order to […]

Posted on 3 April 2019 | 10:39 am

Mira Ransomware Decryptor

We investigated some recent Ransomware called Mira (Trojan:W32/Ransomware.AN) in order to check if it’s feasible to decrypt the encrypted files. Most often, decryption can be very challenging because of missing keys that are needed for decryption. However, in the case of Mira ransomware, it appends all information required to decrypt an encrypted file into the […]

Posted on 1 April 2019 | 9:19 am

A Hammer Lurking In The Shadows

And then there was ShadowHammer, the supply chain attack on the ASUS Live Update Utility between June and November 2018, which was discovered by Kaspersky earlier this year, and made public a few days ago. In short, this is how the trojanized Setup.exe works: An executable embedded in the Resources section has been overwritten by […]

Posted on 29 March 2019 | 9:12 am

Chinese Embassy Scam

Posted on 28 March 2019 | 9:15 am

Analysis of LockerGoga Ransomware

We recently observed a new ransomware variant (which our products detect as Trojan.TR/LockerGoga.qnfzd) circulating in the wild. In this post, we’ll provide some technical details of the new variant’s functionalities, as well as some Indicators of Compromise (IOCs). Overview Compared to other ransomware variants that use Window’s CRT library functions, this new variant relies heavily […]

Posted on 27 March 2019 | 12:19 pm

FBI Warns of Fraud Actors Scamming Investors Through Fictitious Standby Letters of Credit

Posted on 18 March 2019 | 10:00 am

Analysis Of Brexit-Centric Twitter Activity

This is a rather long blog post, so we’ve created a PDF for you to download, if you’d like to read it offline. You can download that from here. Executive Summary This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 […]

Posted on 12 March 2019 | 2:56 am

WordPress 5.1.1 Security and Maintenance Release

WordPress 5.1.1 is now available! This security and maintenance release introduces 14 fixes and enhancements, including changes designed to help hosts prepare users for the minimum PHP version bump coming in 5.2. This release also includes a pair of security fixes that handle how comments are filtered and then stored in the database. With a maliciously […]

Posted on 11 March 2019 | 10:34 pm

Why Social Network Analysis Is Important

I got into social network analysis purely for nerdy reasons – I wanted to write some code in my free time, and python modules that wrap Twitter’s API (such as tweepy) allowed me to do simple things with just a few lines of code. I started off with toy tasks, (like mapping the time of […]

Posted on 21 February 2019 | 7:20 am

Oracle Critical Patch Update Advisory - January 2019

Posted on 15 January 2019 | 1:30 pm

NRSMiner updates to newer version

More than a year after the world first saw the Eternal Blue exploit in action during the May 2017 WannaCry outbreak, we are still seeing unpatched machines in Asia being infected by malware that uses the exploit to spread. Starting in mid-November 2018, our telemetry reports indicate that the newest version of the NRSMiner cryptominer, […]

Posted on 2 January 2019 | 11:04 pm

WordPress 5.0.1 Security Release

WordPress 5.0.1 is now available. This is a security release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. Plugin authors are encouraged to read the 5.0.1 developer notes for information on backwards-compatibility. WordPress versions 5.0 and earlier are affected by the following bugs, which are fixed in version […]

Posted on 12 December 2018 | 9:13 pm

Phishing Campaign targeting French Industry

We have recently observed an ongoing phishing campaign targeting the French industry. Among these targets are organizations involved in chemical manufacturing, aviation, automotive, banking, industry software providers, and IT service providers. Beginning October 2018, we have seen multiple phishing emails which follow a similar pattern, similar indicators, and obfuscation with quick evolution over the course […]

Posted on 26 November 2018 | 7:16 am

Ethics In Artificial Intelligence: Introducing The SHERPA Consortium

In May of this year, Horizon 2020 SHERPA project activities kicked off with a meeting in Brussels. F-Secure is a partner in the SHERPA consortium – a group consisting of 11 members from six European countries – whose mission is to understand how the combination of artificial intelligence and big data analytics will impact ethics […]

Posted on 22 November 2018 | 2:25 am

Spam campaign targets Exodus Mac Users

We’ve seen a small spam campaign that attempts to target Mac users that use Exodus, a multi-cryptocurrency wallet. The theme of the email focuses mainly on Exodus. The attachment was “Exodus-MacOS-1.64.1-update.zip” and the sender domain was “update-exodus[.]io”, suggesting that it wanted to associate itself to the organization. It was trying to deliver a fake Exodus […]

Posted on 2 November 2018 | 12:56 pm

Oracle Critical Patch Update Advisory - October 2018

Posted on 16 October 2018 | 2:30 pm

Oracle Security Alert for CVE-2018-11776 - 31 August 2018

Posted on 31 August 2018 | 7:00 pm

Value-Driven Cybersecurity

Constructing an Alliance for Value-driven Cybersecurity (CANVAS) launched ~two years ago with F-Secure as a member. The goal of the EU project is “to unify technology developers with legal and ethical scholars and social scientists to approach the challenge of how cybersecurity can be aligned with European values and fundamental rights.” (That’s a mouthful, right?) […]

Posted on 31 August 2018 | 8:20 am

Taking Pwnie Out On The Town

Black Hat 2018 is now over, and the winners of the Pwnie Awards have been published. The Best Client-Side Bug was awarded to Georgi Geshev and Rob Miller for their work called “The 12 Logic Bug Gifts of Christmas.” Georgi and Rob work for MWR Infosecurity, which (as some of you might remember) was acquired by F-Secure […]

Posted on 14 August 2018 | 6:58 am

Oracle Security Alert for CVE-2018-3110 - 10 August 2018

Posted on 10 August 2018 | 2:30 pm

How To Locate Domains Spoofing Campaigns (Using Google Dorks) #Midterms2018

The government accounts of US Senator Claire McCaskill (and her staff) were targeted in 2017 by APT28 A.K.A. “Fancy Bear” according to an article published by The Daily Beast on July 26th. Senator McCaskill has since confirmed the details. And many of the subsequent (non-technical) articles that have been published has focused almost exclusively on […]

Posted on 30 July 2018 | 12:17 pm

Oracle Critical Patch Update Advisory - July 2018

Posted on 17 July 2018 | 2:30 pm

WordPress 4.9.7 Security and Maintenance Release

WordPress 4.9.7 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9.6 and earlier are affected by a media issue that could potentially allow a user with certain capabilities to attempt to delete files outside the uploads […]

Posted on 5 July 2018 | 12:00 pm

Video: Creating Graph Visualizations With Gephi

I wanted to create a how-to blog post about creating gephi visualizations, but I realized it’d probably need to include, like, a thousand embedded screenshots. So I made a video instead.

Posted on 24 May 2018 | 2:50 am

Pr0nbots2: Revenge Of The Pr0nbots

A month and a half ago I posted an article in which I uncovered a series of Twitter accounts advertising adult dating (read: scam) websites. If you haven’t read it yet, I recommend taking a look at it before reading this article, since I’ll refer back to it occasionally. To start with, let’s recap. In my […]

Posted on 4 May 2018 | 5:03 am

Oracle Critical Patch Update Advisory - April 2018

Posted on 17 April 2018 | 2:30 pm

WordPress 4.9.5 Security and Maintenance Release

WordPress 4.9.5 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9.4 and earlier are affected by three security issues. As part of the core team's ongoing commitment to security hardening, the following fixes have been implemented […]

Posted on 3 April 2018 | 2:56 pm

Marketing “Dirty Tinder” On Twitter

About a week ago, a Tweet I was mentioned in received a dozen or so “likes” over a very short time period (about two minutes). I happened to be on my computer at the time, and quickly took a look at the accounts that generated those likes. They all followed a similar pattern. Here’s an […]

Posted on 16 March 2018 | 4:49 am

How To Get Twitter Follower Data Using Python And Tweepy

In January 2018, I wrote a couple of blog posts outlining some analysis I’d performed on followers of popular Finnish Twitter profiles. A few people asked that I share the tools used to perform that research. Today, I’ll share a tool similar to the one I used to conduct that research, and at the same […]

Posted on 27 February 2018 | 6:07 am

Improving Caching Strategies With SSICLOPS

F-Secure development teams participate in a variety of academic and industrial collaboration projects. Recently, we’ve been actively involved in a project codenamed SSICLOPS. This project has been running for three years, and has been a joint collaboration between ten industry partners and academic entities. Here’s the official description of the project. “The Scalable and Secure […]

Posted on 26 February 2018 | 2:11 am

Searching Twitter With Twarc

Twarc makes it really easy to search Twitter via the API. Simply create a twarc object using your own API keys and then pass your search query into twarc’s search() function to get a stream of Tweet objects. Remember that, by default, the Twitter API will only return results from the last 7 days. However, […]

Posted on 16 February 2018 | 8:33 am

WordPress 4.9.2 Security and Maintenance Release

WordPress 4.9.2 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. An XSS vulnerability was discovered in the Flash fallback files in MediaElement, a library that is included with WordPress. Because the Flash files are no longer needed for […]

Posted on 16 January 2018 | 5:00 pm

Oracle Critical Patch Update Advisory - January 2018

Posted on 16 January 2018 | 1:30 pm

WordPress 4.9.1 Security and Maintenance Release

WordPress 4.9.1 is now available. This is a security and maintenance release for all versions since WordPress 3.7. We strongly encourage you to update your sites immediately. WordPress versions 4.9 and earlier are affected by four security issues which could potentially be exploited as part of a multi-vector attack. As part of the core team's […]

Posted on 29 November 2017 | 2:33 pm

Oracle Security Alert for CVE-2017-10269 - 13 November 2017

Posted on 13 November 2017 | 1:30 pm

WordPress 4.8.3 Security Release

WordPress 4.8.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.8.2 and earlier are affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to […]

Posted on 31 October 2017 | 9:20 am

Oracle Security Alert for CVE-2017-10151 - 27 October 2017

Posted on 27 October 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - October 2017

Posted on 17 October 2017 | 2:30 pm

Oracle Security Alert for CVE-2017-9805 - 22 September 2017

Posted on 22 September 2017 | 2:30 pm

WordPress 4.8.2 Security and Maintenance Release

WordPress 4.8.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.8.1 and earlier are affected by these security issues: $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this […]

Posted on 19 September 2017 | 5:17 pm

Oracle Critical Patch Update Advisory - July 2017

Posted on 18 July 2017 | 2:30 pm

Oracle Security Alert for CVE-2017-3629

Posted on 19 June 2017 | 2:30 pm

WordPress 4.7.5 Security and Maintenance Release

WordPress 4.7.5 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.4 and earlier are affected by six security issues: Insufficient redirect validation in the HTTP class. Reported by Ronni Skansing. Improper handling of post meta data values in the XML-RPC […]

Posted on 16 May 2017 | 5:39 pm

WordPress Now on HackerOne

WordPress has grown a lot over the last thirteen years – it now powers more than 28% of the top ten million sites on the web. During this growth, each team has worked hard to continually improve their tools and processes. Today, the WordPress Security Team is happy to announce that WordPress is now officially […]

Posted on 15 May 2017 | 11:02 am

Oracle Critical Patch Update Advisory - April 2017

Posted on 18 April 2017 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2017

Posted on 17 January 2017 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2016

Posted on 18 October 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2016

Posted on 19 July 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2016

Posted on 19 April 2016 | 2:30 pm

Oracle Security Alert for CVE-2016-0636 - 23 Mar 2016

Posted on 23 March 2016 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2016

Posted on 19 January 2016 | 1:30 pm

Oracle Security Alert for CVE-2015-4852 - 10 November 2015

Posted on 10 November 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2015

Posted on 20 October 2015 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2015

Posted on 14 July 2015 | 2:30 pm

Oracle Security Alert for CVE-2015-3456 - 15 May 2015

Posted on 15 May 2015 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2015

Posted on 14 April 2015 | 2:30 pm

Oracle Security Alert for CVE-2016-0603 - 5 February 2016

Posted on 5 February 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - January 2015

Posted on 20 January 2015 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2014

Posted on 14 October 2014 | 2:30 pm

Oracle Security Alert for CVE-2014-7169 - 26 September 2014

Posted on 26 September 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2014

Posted on 15 July 2014 | 2:30 pm

Oracle Security Alert for CVE-2014-0160 - 18 April 2014

Posted on 18 April 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2014

Posted on 15 April 2014 | 2:30 pm

Oracle Critical Patch Update Advisory - January 2014

Posted on 14 January 2014 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2013

Posted on 15 October 2013 | 2:30 pm

Oracle Critical Patch Update Advisory - July 2013

Posted on 16 July 2013 | 2:30 pm

Oracle Java SE Critical Patch Update Advisory - June 2013

Posted on 18 June 2013 | 2:30 pm

Oracle Critical Patch Update Advisory - April 2013

Posted on 16 April 2013 | 2:30 pm

Oracle Java SE Critical Patch Update Advisory - April 2013

Posted on 16 April 2013 | 2:30 pm

Oracle Security Alert for CVE-2013-1493 - 04 Mar 2013

Posted on 4 March 2013 | 1:30 pm

Updated Release of the Oracle Java SE Critical Patch Update - February 2013

Posted on 19 February 2013 | 1:30 pm

Oracle Java SE Critical Patch Update Advisory - February 2013

Posted on 1 February 2013 | 1:30 pm

Oracle Critical Patch Update Advisory - January 2013

Posted on 15 January 2013 | 1:30 pm

Oracle Security Alert for CVE-2013-0422 - 13 Jan 2013

Posted on 13 January 2013 | 1:30 pm

Oracle Critical Patch Update Advisory - October 2012

Posted on 16 October 2012 | 2:26 pm

Oracle Java SE Critical Patch Update Advisory - October 2012

Posted on 16 October 2012 | 2:26 pm

Oracle Security Alert for CVE-2012-4681 - 30 Aug 2012

Posted on 30 August 2012 | 2:26 pm

Oracle Security Alert for CVE-2012-3132 - 10 Aug 2012

Posted on 10 August 2012 | 2:14 pm

Oracle Critical Patch Update (CPU) Advisory - July 2012

Posted on 19 July 2012 | 5:15 pm

Oracle Java SE Critical Patch Update Advisory - June 2012

Posted on 12 June 2012 | 3:00 pm

Oracle Security Alert for CVE-2012-1675

Posted on 30 April 2012 | 3:01 pm

Oracle Critical Patch Update (CPU) Advisory - April 2012

Posted on 18 April 2012 | 10:40 am

Oracle Java SE Critical Patch Update Advisory - February 2012

Posted on 14 February 2012 | 2:00 pm

Oracle Security Alert for CVE-2011-5035

Posted on 31 January 2012 | 3:20 pm

Oracle Critical Patch Update (CPU) Advisory - January 2012

Posted on 17 January 2012 | 2:44 pm

Oracle Critical Patch Update (CPU) Advisory - October 2011

Posted on 24 October 2011 | 1:33 pm

Oracle Security Alert for CVE-2011-3192

Posted on 15 September 2011 | 4:22 pm

Oracle Critical Patch Update (CPU) Advisory - July 2011

Posted on 19 July 2011 | 5:45 pm

Oracle Java SE Critical Patch Update Advisory - June 2011

Posted on 7 June 2011 | 5:18 pm

Oracle Critical Patch Update (CPU) - April 2011

Posted on 19 April 2011 | 3:00 pm

Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011

Posted on 15 February 2011 | 4:00 pm

Oracle Critical Patch Update (CPU) - January 2011

Posted on 18 January 2011 | 1:40 pm

Oracle Critical Patch Update (CPU) - October 2010

Posted on 12 October 2010 | 11:07 am

Oracle Critical Patch Update (CPU) - July 2010

Posted on 14 July 2010 | 2:35 pm

Oracle Critical Patch Update (CPU) - April 2010

Posted on 13 April 2010 | 4:01 pm

Oracle Security Alert for CVE-2010-0073 - February 2010

Oracle Security Alert for CVE-2010-0073

Posted on 4 February 2010 | 2:00 pm

Critical Patch Update - January 2010

Posted on 13 January 2010 | 12:05 pm

Critical Patch Update - October 2009

Posted on 20 October 2009 | 10:39 am

Critical Patch Update - July 2009

Posted on 15 July 2009 | 8:00 pm

Critical Patch Update - April 2009

Posted on 14 April 2009 | 5:40 pm

Critical Patch Update - January 2009

Posted on 14 April 2009 | 5:40 pm

Critical Patch Update - October 2008

Posted on 15 October 2008 | 1:53 pm

Critical Patch Update - July 2008

Posted on 15 July 2008 | 3:01 pm

Critical Patch Update - April 2008

Posted on 15 April 2008 | 5:13 pm

Critical Patch Update - January 2008

Posted on 15 January 2008 | 4:55 pm

Critical Patch Update - October 2007

Posted on 16 October 2007 | 3:47 pm

Critical Patch Update - July 2007

Posted on 17 July 2007 | 3:21 pm

Critical Patch Update - April 2007

Posted on 18 April 2007 | 10:57 am

Critical Patch Update - January 2007

Posted on 16 January 2007 | 5:35 pm

Critical Patch Update - October 2006

Posted on 17 October 2006 | 1:37 pm

Critical Patch Update - April 2006

Posted on 18 April 2006 | 3:42 pm

Critical Patch Update - January 2006

Posted on 17 January 2006 | 6:20 pm

Critical Patch Update - January 2005

Posted on 18 October 2005 | 5:28 pm

Critical Patch Update - April 2005

Posted on 18 October 2005 | 5:28 pm

Critical Patch Update - October 2005

Posted on 18 October 2005 | 5:25 pm

Critical Patch Update - July 2005

Posted on 12 July 2005 | 2:46 pm