Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 1 to 10
How Internet Savvy Are Your Leaders?
10th Dec 2018 [17 hours ago] from Krebsonsecurity
Back in April 2015, I tweeted about receiving a letter via snail mail suggesting the search engine rankings for a domain registered in my name would suffer if I didnt pay a bill for some kind of dubious-looking service Id never heard of....
Next Generation Dark Markets? Think Amazon Or EBay For Criminals
10th Dec 2018 [24 hours ago] from ESET Research
The “evolution” of these markets is making cybercrime easier than ever before The post Next Generation Dark Markets? Think Amazon or eBay for criminals appeared first on WeLiveSecurity
Bomb Threat Hoaxer, DDos Boss Gets 3 Years
7th Dec 2018 [3 days ago] from Krebsonsecurity
The alleged ringleader of a gang of cyber hooligans that made bomb threats against hundreds of schools and launched debilitating denial-of-service attacks against Web sites (including KrebsOnSecurity on multiple occasions) has been sentenced...
CISO Series: Strengthen Your Organizational Immune System With Cybersecurity Hygiene
6th Dec 2018 [5 days ago] from Microsoft
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organizations resiliency in the face of attacks and exploits. The post CISO series: Strengthen...
DanaBot Evolves Beyond Banking Trojan With New Spam-sending Capability
6th Dec 2018 [5 days ago] from ESET Research
ESET research shows that DanaBot operators have been expanding the malware’s scope and possibly cooperating with another criminal group The post DanaBot evolves beyond banking Trojan with new spam-sending capability appeared first on...
Step 1. Identify Users: Top 10 Actions To Secure Your Environment
5th Dec 2018 [6 days ago] from Microsoft
This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. Well provide advice on activities such as setting up identity management through active directory, malware protection,...
The Dark Side Of The ForSSHe
5th Dec 2018 [6 days ago] from ESET Research
ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, “The Dark Side of the ForSSHe”, they release analysis of 21 malware families to improve the prevention, detection...
A Breach, Or Just A Forced Password Reset?
4th Dec 2018 [7 days ago] from Krebsonsecurity
Software giant Citrix Systems recently forced a password reset for many users of its Sharefile content collaboration service, warning it would be doing this on a regular basis in response to password-guessing attacks that target people...
Machine-to-Machine (M2M) Technology Design Issues And Implementation Vulnerabilities
4th Dec 2018 [7 days ago] from TrendMicro
We delve into the protocol security issues that may crop up from a technology perspective. The scarce awareness that we’ve observed around the current state of MQTT and CoAP can enable attackers in achieving their goals, ranging from...
Cyber Monday: The Biggest Day For Cyberattacks? Not By A Long Shot.
3rd Dec 2018 [7 days ago] from Zscaler
Last week, the Zscaler ThreatLabZ research team did an analysis of phishing attacks we’ve come across in our cloud leading up to Black Friday and Cyber Monday. The team had been seeing an increase in a variety of phishing activities,...
1 2 3 4 5 6 7 8 9 10 Older »