Spam-spewing IoT botnet infects 100,000 routers using five-year-old flaw

Security researchers are warning that a botnet has been exploiting a five-year-old vulnerability to hijack home routers over the last couple of months. Analysts working at Qihoo 360’s Netlab team say that...

My Top 5 Tools For Online Publishing

The field of online publishing has been flourishing since last few years and this seems to be increasing in a continuous fashion...

Threat Actors Exploiting Red Team Tool JexBoss

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Department of Homeland Security (DHS), has issued a US-CERT alert for the JBoss Verify and EXploitation (JexBoss) tool, an...

Security Affairs newsletter Round 188 – News of the weekSecurity Affairs

Pierluigi Paganini Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist,...

She Won’t Leave A Soldier, Or Classmate, Behind

Celebrating Veterans Day with U.S. Navy vet and Symantec C3 graduate Leslie Washington Source link

8 features a cybersecurity technology platform must have

<!--8 features a cybersecurity technology platform must have | CSO Online

Chinese headmaster fired after setting up his own secret cryptomining rig at school –...

A Chinese headmaster has lost his job after it was discovered he was stealing the school’s electricity to power...

Introducing the Android Ecosystem Security Transparency Report

Posted by Jason Woloz and Eugene Liderman, Android Security & Privacy TeamUpdate: We identified a bug that affected how we calculated data from Q3 2018 in the Transparency Report. This...

How You Can Become Part of an Elite Cybersecurity Force

CQURE Academy is an IT training company formed in 2008 in Poland and since then has expanded to the rest of Europe, the Americas, Middle East, and Asia – as...

Stealthy Crypto-Mining Malware Evades Detection

Cryptocurrency mining has become a fairly easy way to manufacture currency, and according to Trend Micro, a new cryptocurrency-mining malware uses evasion techniques, including Windows Installer, as part of its...

LATEST NEWS

MUST READ