New vulnerability lets attackers sniff or hijack VPN connections

New vulnerability lets attackers sniff or hijack VPN connections

Academics have disclosed this week a security flaw impacting Linux, Android, macOS, and other Unix-based operating systems that allows an attacker to sniff, hijack, and…

View More New vulnerability lets attackers sniff or hijack VPN connections
Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying

Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying

Even if you’re diligent about app permissions, sometimes you just can’t predict how or when a bad actor will abuse them. This time around, a…

View More Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying
DDoS Kingpin Gets 13 Months, Massive Fine

DDoS Kingpin Gets 13 Months, Massive Fine

A US court has sentenced the operator of a massive DDoS service to 13 months in prison. Sergiy Usatyuk, 21, from Orland Park, IL was…

View More DDoS Kingpin Gets 13 Months, Massive Fine
How firewall automation can help prevent breaches caused by wrong configurations

How firewall automation can help prevent breaches caused by wrong configurations

A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes. Firewalls are a critical form…

View More How firewall automation can help prevent breaches caused by wrong configurations
Cybercriminals using Google Analytics to enhance phishing efforts

Cybercriminals using Google Analytics to enhance phishing efforts

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts. Cloud security firm Akamai released a new…

View More Cybercriminals using Google Analytics to enhance phishing efforts
University to Create New Cybersecurity Approach Inspired by the Human Body

University to Create New Cybersecurity Approach Inspired by the Human Body

Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is…

View More University to Create New Cybersecurity Approach Inspired by the Human Body
IoT Botnets and DDoS Attacks: Architecting Against Disaster

IoT Botnets and DDoS Attacks: Architecting Against Disaster

Cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on…

View More IoT Botnets and DDoS Attacks: Architecting Against Disaster
More than two million major cyberattacks hit globally last year

More than two million major cyberattacks hit globally last year

Last year saw more than two million major cyberattacks strike businesses across the world. The latest figures by the Internet Society’s Online Trust Alliance claim that these…

View More More than two million major cyberattacks hit globally last year
Vietnam Rises as Cyberthreat

Vietnam Rises as Cyberthreat

The country’s rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity. Vietnam has rarely been associated with cybercrime…

View More Vietnam Rises as Cyberthreat
What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams