From SC Magazine: Roy Zisapel, Radware CEO, Says Flame-Like Vulnerabilities...
Yesterday, SC Magazine published an article by Radware’s president and CEO, Roy Zisapel, addressing the infamous Flame malware. Flame stole headlines over the past month, emerging as the most advanced...
View ArticleThe Malware Update: A Look at the Latest Malware That’s Attacking Business...
Recently, new malware was discovered with the ability to identify the operating system of the victim, and infect them accordingly. As most of the secure platform myths have been busted, we have...
View ArticleFrom Defense to Offense – Three Steps to Successful Attack Mitigation
In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions...
View ArticleThe New Social Security: How Social Media is Changing the Cyber Security...
From our personal to our professional lives, today most of us use social media in one form or another. Till now, the majority of organizations have focused primarily on the best ways to use social...
View ArticleInside the World of Hacker Reconnaissance
The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have...
View ArticleThe End of Windows XP
Windows XP support has ended and there will be no more patches. This ongoing news story has repeatedly stressed that millions of computers that run the operating system Windows XP will no longer...
View ArticleCyber Attacks on Oil and Gas
A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly introduced by a Russian hacking group and it targeted oil, gas, power, and...
View ArticleIs Your Home (Network) Haunted? The Threats of the Ghost Vulnerability and...
Recent vulnerabilities have surfaced that have opened up interesting debates and spirited discussions regarding what I see as vulnerabilities in embedded Linux systems. Devices that are considered...
View ArticleCyber-Security Concerns to Know Before You Sign On
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. Any of us who use the Internet with regularity enjoy the benefits of Federated Identity...
View Article5 Reasons Why Virtual Machine Security Could Become a Larger Threat
The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! What is happening now that is causing us to just get around to finding...
View ArticleCyber Attack Marketplace: Where, How, and Why of Purchasing an Attack
Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at an alarming rate. Part of this growth can be...
View ArticleMalware and Botnet Attack Services Found on the Darknet
Over the last several months we have explored a number of attack marketplaces along with the different tools and services offered on the Darknet. In this post we are going to take a deeper look at the...
View ArticleIPv6 Security Today
According to Google Statistics, we are only at around 15% adoption of Internet Protocol version 6 (IPv6) worldwide. Because of the low adoption rate today, have we really even scratched the surface on...
View ArticleThe Shadow Brokers went dark, the NSA weakened and exposed in the cyber war
On January 12th, the Shadow Brokers announced they are ‘going dark’ by leaving a farewell: “So long, farewell peoples. TheShadowBrokers is going dark, making exit. Continuing is being much risk and...
View Article“For Educational Purposes Only”
Education, freedom and knowledge. These are the pillars for higher learning, but have often been used to describe some open source projects and services that have the potential to be abused by those...
View ArticleEverything You Need to Know About Brickerbot, Hajime, and IoT Botnets
By now you have probably heard about Brickerbot, Hajime, and the growing problem of Internet of Things (IoT) botnets. This round-up will provide you with a number of comprehensive resources to bring...
View ArticleSMB Vulnerabilities – WannaCry, Adylkuzz and SambaCry
Last month on Friday, May 12th a global incident related to a ransomware variant named WannaCry broke out, targeting computers around the world. Everything from personal computers to corporate and...
View ArticleCodeFork hackers fooled many security solutions. How about yours?
As a result of Radware’s recent acquisition of Seculert, the startup that developed machine-learning algorithms that are capable of detecting and blocking zero-day malwares in cloud environments,...
View ArticleJenX – Los Calvos de San Calvicie
A new botnet recently started recruiting IoT devices. The botnet uses hosted servers to find and infect new victims leveraging one of two known vulnerabilities that have become popular in IoT botnets...
View ArticleYou Need a New Approach to Stop Evasive Malware
Evasive malware has become a key threat to businesses’ sensitive data. Stealing and selling sensitive data on the Darknet is a lucrative business for hackers, who increasingly rely on evasive malware...
View Article
More Pages to Explore .....