Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 81 to 90
Defending Critical Infrastructure Is Imperative
1st Feb 2019 [2 months ago] from Microsoft
Learn about the most potent cyberthreats to critical infrastructure and why owners and operators of critical infrastructure have a unique responsibility to undertake cyber resilience. The post Defending critical infrastructure is imperative...
Four New Caches Of Stolen Logins Put Collection #1 In The Shade
1st Feb 2019 [2 months ago] from ESET Research
The recently discovered tranches of stolen login credentials freely floating around the internet total 2.2 billion records The post Four new caches of stolen logins put Collection #1 in the shade appeared first on WeLiveSecurity
250 Webstresser Users To Face Legal Action
1st Feb 2019 [2 months ago] from Krebsonsecurity
More than 250 customers of a popular and powerful online attack-for-hire service that was dismantled by authorities in 2018 are expected to face legal action for the damage they caused, according to Europol, the European Unions law enforcement...
CISO Series: Talking Cybersecurity With The Board Of Directors
31st Jan 2019 [2 months ago] from Microsoft
To maintain a boards confidence, you need to engage them in your strategy early and often. The post CISO Series: Talking cybersecurity with the board of directors appeared first on Microsoft Secure.
Japan To Probe Citizens’ IoT Devices In The Name Of Security
31st Jan 2019 [2 months ago] from ESET Research
Smart devices were targeted by more than one-half of cyberattacks detected in the country in 2017 The post Japan to probe citizens’ IoT devices in the name of security appeared first on WeLiveSecurity
Cybercrime Black Markets: Dark Web Services And Their Prices
31st Jan 2019 [2 months ago] from ESET Research
A closer look at cybercrime as a service on the dark web The post Cybercrime black markets: Dark web services and their prices appeared first on WeLiveSecurity
Step 4. Set Conditional Access Policies: Top 10 Actions To Secure Your Environment
30th Jan 2019 [2 months ago] from Microsoft
The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your...
‘We’re Coming For You’, Global Police Tell DDoS Attack Buyers
30th Jan 2019 [2 months ago] from ESET Research
First closing in on operators, now on users, as the hunt continues and law enforcement in many countries is about to swoop on people who bought DDoS attacks on WebStresser The post ‘We’re coming for you’, global police tell DDoS attack...
“Love You” Malspam Gets A Makeover For Massive Japan-targeted Campaign
30th Jan 2019 [2 months ago] from ESET Research
ESET researchers have detected a substantial new wave of the “Love you” malspam campaign, updated to target Japan and spread GandCrab 5.1 The post “Love you” malspam gets a makeover for massive Japan-targeted campaign appeared first...
Various Google Play “Beauty Camera” Apps Sends Users Pornographic Content, Redirects Them To Phishing Websites And Collects Their...
30th Jan 2019 [2 months ago] from TrendMicro
We discovered several beauty camera apps (detected as AndroidOS_BadCamera.HRX) on Google Play that are capable of accessing remote ad configuration servers that can be used for malicious purposes. Some of these have already been downloaded...
« Newer 4 5 6 7 8 9 10 11 12 13 Older »