By Year

By Type

  • In The News (1296)

By Topic

By Product Category

By Services

By Technologies

By Industry

By Audience

By Language

Displaying 1 to 30 of 1626

‘Shift left’ prevents missteps that lead to 90% of breaches in cloud computing

Lugging workloads from on-premises to public cloud is straining when done with flimsy security policies.
  • 0
  • 178

The Cybersecurity 202: Trump is getting tough on Chinese hacking. Will it work?

The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.
  • 0
  • 342

49% of Cloud Databases Left Unencrypted

Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.
  • 0
  • 311

Palo Alto Networks to provide new 5G-ready firewall security product

Cybersecurity researchers have detected new spearphishing and malicious-email campaigns associated with two Russian-government-linked hacking groups known for breaching the Democratic National Committee in 2016.
  • 1
  • 398

Palo Alto Networks to launch next-gen firewall for 5G networks

5G networks will bring more speed, less latency and probably more security headaches. Enter Palo Alto Networks, which will court carriers who will be on the hook for securing 5G.
  • 1
  • 365


A MAJOR QUESTION hanging over the United States midterm election season: Where was Russia?
  • 0
  • 384

Researchers uncover new malware activity by Russian hackers

Researchers have attributed new malware activity targeting governments in several countries to a Russian hacking group.
  • 0
  • 356

Russian APT activity is resurgent, researchers say

Cybersecurity researchers have detected new spearphishing and malicious-email campaigns associated with two Russian-government-linked hacking groups known for breaching the Democratic National Committee in 2016.
  • 0
  • 306

Russian hacking tool gets extra stealthy to target US, European computers

This malicious software will email your hacker from your computer without you ever knowing.
  • 0
  • 349

What’s next for DHS cyber changeup

What’s next for DHS cyber changeup
  • 0
  • 364

Fake Adobe Flash Installers Come With a Little Malware Bonus

A recent scourge of fake Adobe installers really does provide an update to the latest version of Flash.
  • 0
  • 518

Fake Adobe Flash Updates Hide Malicious Crypto Miners

A fake Adobe update actually updates victims’ Flash – but also installs malicious cryptomining malware.
  • 0
  • 564

Cryptomining malware discovered masquerading as Flash updates

This malware is so sneaky it updates your Flash to look legit.
  • 0
  • 538

A flood of fake installers will really update Flash for you – but also install cryptocurrency mining malware

If you think that Flash, the once-popular web plugin, couldn’t die fast enough, even those annoying fake Flash installers riddled with malware aren’t going anywhere any time soon. In fact, they’re getting even sneakier.
  • 0
  • 588

New OilRig APT campaign leverages a new variant of the OopsIE Trojan

The Iran-linked APT group OilRig was recently observed using a new variant of the OopsIE Trojan that implements news evasion capabilities.
  • 0
  • 728

Iron Group suspected in creation of Xbash all-in-one malware

A threat actor has been targeting Windows and Linux servers with a self-propagating malware mash-up that’s comprised of botnet, ransomware, disk wiper, cryptomining and worm elements all in one.
  • 0
  • 805

USA Is the Top Country for Hosting Malicious Domains According to Report

The US continues to be the top country hosting domains that serves web-based threats and the main source for exploit kit distribution at a global level, according to new research.
  • 0
  • 716

A well-known hacking group is getting better at evading detection

A well-known hacking group remains highly active with new incursions against Middle Eastern governments, according to a new report from U.S. cybersecurity firm Palo Alto Networks. Additionally, the group is employing evasion techniques meant to cut down on the risk of detection.
  • 0
  • 715

New Mirai variant attacks Apache Struts vulnerability

New variants of the Gafgyt and Mirai botnets are targeting unpatched enterprise devices, which indicates a greater shift away from consumer devices, according to researchers.
  • 0
  • 802

Palo Alto Networks expands Google partnership to leverage Google Cloud AI capabilities

As part of the enhanced relationship with Google, Palo Alto Networks will now run their Application Framework and GlobalProtect cloud service in the Google Cloud, as they believe its analytics capabilities are the best fit for these applications.
  • 0
  • 151

The daily briefing

Today's regular daily summary starts here.
  • 0
  • 1326

DarkHydrus Uses Open Source Phishery Tool in Middle-East Attacks

Today's regular daily summary starts here.
  • 0
  • 1198

FBI struggles to keep top cyber talent

  • 0
  • 1139

Hacking group combines spear-phishing with mass malware campaign

Pakistani hacking group uses basic techniques and has poor operational security - but appears to have slithered into a large number of networks.
  • 0
  • 1019

Worst of both words: 'Gorgon' hackers practice both general cybercrime and targeted government attacks

A hacking group apparently based in Pakistan has been straddling the fence between cybercriminal activity and nation-state espionage, leveraging the same malicious infrastructure to both launch email spam campaigns and target government agencies in U.S., UK, Russia and Spain
  • 0
  • 975

Android apps infected with umm… *Windows* malware

  • 0
  • 1106

Android Apps Infected With Windows Keylogger Removed From Google Play Store

Google has removed 145 Android apps infected with Windows malware from the official Play Store after a report from security researchers at Palo Alto Networks.
  • 0
  • 999

Tick Group Malware Campaign Highlights Need for Stronger Supply Chain Security

Security researchers recently observed a malware campaign that leverages a particular type of USB drive to target specific Windows machines.
  • 0
  • 1161

Mirai, Gafgyt IoT Botnet Attacks Intensify

Security researchers are warning of a new wave of attacks associated with two infamous Internet of Things (IoT) botnets: Mirai and Gafgyt.
  • 0
  • 1024
Displaying 1 to 30 of 1626