Network Security

Network Security news, trend analysis and opinion

neiman marcus exterior

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server


Researchers improve de-anonymization attacks for websites hiding on Tor

Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them

OPM, Anthem hackers reportedly also breached United Airlines

Flight manifests including passenger information and destinations were stolen, report claims

Maliciously crafted MKV video files can be used to crash Android phones

Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites

Logos

AnyConnect Day 0 Support for Windows 10 and OSX El Capitan

A summary of what versions are needed. What needs to be uninstall and re-installed. Best practices to get AnyConnect support on Day-1 of Windows 10, and what to do BEFORE you upgrade.

Russian hackers use Twitter to mask sneaky data theft

The Hammertoss malware reads encrypted data hidden in images to obtain new instructions

Cybersecurity Technology Integration Changes Everything

Based upon current and future cybersecurity technology integration trends, CISOs are adjusting budgets, organizations, skills, and vendor choices. Even industry analysts are impacted by cybersecurity technology integration.

Darkode cybercrime forum might be making a comeback

The forum's last administrator has plans to restore the site, with better protections against law enforcement investigations

Google: Lock up your Compute Engine data with your own encryption keys

The company didn't say whether it will offer this feature to its other Cloud Platform services

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Researchers disclose four unpatched vulnerabilities in Internet Explorer

The reports contain limited information, making exploit development hard and unlikely

Measuring the Quality of Commercial Threat Intelligence

One person’s quality is another person’s fluff so objective measurements will be difficult. Threat intelligence quality may ultimately be gauged through crowdsourcing and threat intelligence sharing.

Former Hacking Team supplier stops selling zero-day exploits on ethical grounds

U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers

Report: Microsoft paying $320 million for cloud security provider Adallom

Adallom provides a range of security and data gathering tools to businesses

Cyberspies love exploits from Hacking Team leak

Advanced hacking group uses a second Flash exploit leaked from the surveillance software maker

Are There Differences Between Threat Intelligence Feeds?

Enterprise cybersecurity professionals find it difficult to judge the quality and efficacy of disparate open source and commercial threat intelligence. In the short term, this means more buying and selling.

Bogus news app used to deliver Hacking Team spy tool

Trend Micro found the app, along with exploit code and instructions, in the leaked data

New point-of-sale malware distributed by Andromeda botnet

Attackers use spam to infect systems with the Andromeda backdoor and then deploy GamaPoS on select point-of-sale machines

Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical

Researchers show they can recover sensitive cookies from RC4-encrypted TLS connections in 75 hours

Load More