Exploit Kit Attacks on the Rise as Astrum Emerges
Credit to Author: Trend Micro| Date: Mon, 10 Jul 2017 20:35:44 +0000
A powerful exploit kit known as Astrum recently made its way back into the cyber attack limelight.
RSS Reader for Computer Security Articles
Credit to Author: Trend Micro| Date: Mon, 10 Jul 2017 20:35:44 +0000
A powerful exploit kit known as Astrum recently made its way back into the cyber attack limelight.
Credit to Author: Trend Micro| Date: Mon, 10 Jul 2017 18:53:57 +0000
By studying the Deep Web, organizations can get a better sense of the overall threat environment – and be more prepared to guard against emerging vulnerabilities and attacks.
Credit to Author: Ryan Delany| Date: Mon, 10 Jul 2017 17:52:43 +0000
Managed service providers (MSPs) offer a broad set of services to their customers, including configuring, managing, maintaining, monitoring and securing increasingly complex IT environments. In addition, they also have a business to run, employees to manage, technician utilization to monitor, profits to grow, expenses to keep in check … the list goes on and on….
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 07 Jul 2017 15:45:09 +0000
It has been quoted by Albert Einstein, Benjamin Franklin, and others that insanity is “doing the same thing over and over again and expecting different results.” I could say that in our world of cyber security, despite all the headlines about data breaches and ransomware, there is no “insanity.” Products we used 25 years ago…
Credit to Author: Brian Gorenc| Date: Thu, 06 Jul 2017 16:31:43 +0000
Running the world’s largest vendor agnostic bug bounty program has afforded us the unique opportunity to purchase bugs of all varieties. The submissions to the Zero Day Initiative (ZDI) program range in severity from slightly annoying to hugely impactful. We wouldn’t have it any other way. Generally speaking, the goal of a bug bounty program…
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 30 Jun 2017 12:00:57 +0000
The late 70s/early 80s American television show Three’s Company was one of my favorite shows growing up. The central theme of the show revolved around the lives of three roommates. Each episode usually involved a misunderstanding, then chaos would ensue. In the end, everything would turn out okay. Unfortunately, this week’s episode of “ransomware in…
Credit to Author: Rik Ferguson (VP, Security Research)| Date: Wed, 28 Jun 2017 16:01:32 +0000
Hot on the heels of the global WannaCry outbreak in May, yesterday saw a wave of what looked like copycat malware sweeping the globe again. However, on closer inspection there may more to this than meets the eye, more than a simple new variant of an already established ransomware borrowing propagation techniques from WannaCry. The…
Credit to Author: Trend Micro| Date: Mon, 26 Jun 2017 17:05:09 +0000
Local governments and city planners must work to bolster their digital security alongside their technological capabilities.