Infosecurity News
TfL Suspends Oyster Site After Credential Stuffing Blitz
Customers encouraged not to reuse passwords
Broadcom Snaps Up Symantec Enterprise Security Biz For $10.7bn
Existing Symantec business with lose its name but keep Norton products
#BHUSA: Cult of the Dead Cow Members Discuss Hacktivism, Influence & Politicians
Cult of the Dead Cow reunite to discuss influence and legacy
#BHUSA: DevSecOps, Looking Beyond the Buzzword
DevSecOps isn't just yet another meaningless buzzword
#BHUSA: How GDPR Can Help Attackers Steal Identities
A GDPR component was abused to get access to personally identifiable information
#BHUSA Scope of Russia's Dark Web Revealed
The scale and content of Russian dark web was revealed in new research
#BHUSA Empathy is Key to Hiring and Retaining Women in Cybersecurity
Rebecca Lynch of Duo Security gave a talk on hiring, and just as importantly retaining, women in the cybersecurity industry.
#BHUSA: Five Years of Google Project Zero Should Influence Similar Groups
Project Zero boss looks back at five years of research
#BHUSA: Increase Social Media Awareness With Active and Passive Testing
A new tool enables active social media testing.
#BHUSA: Defending Against Morphing DDoS with SODA
F5 Labs researchers release a new open source tool and model to help organizations prepare for and defend against an emerging form of disruptive attack.
Researchers Detect Spambot Recording Victims' Screens as They Watch Sexual Content
Malware-distributing spam campaigns are targeting people in France
FireEye Identifies Prolific Chinese Cyber-Threat Group
APT41 has targeted various industries across multiple jurisdictions.
Researchers Reveal 35 Flaws in Six Printers
Sysadmins urged to patch after latest discovery
CafePress Slammed After Major Breach Affecting 23 Million
Exposed data included unique email addresses and passwords
#BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk
Reclassifying phishing attacks, and the ways to help users spot them
North Korean Hackers Amass $2bn Via Cyber-Attacks
Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN
#BHUSA : Open Source is Key to Solving Cyber Skills Gap
At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry
#BHUSA: Keynote Encourages Positivity and Collaboration
The Black Hat USA keynote encourages better collaboration and a more positive culture
LokiBot Gets Sneakier With Steganography
LokiBot is getting stealthier and is now hiding its devastating payload in image files.
IBM's Warshipping Attacks Wi-Fi Networks From Afar
Forget wardriving; warshipping is a more targeted way to hit a company's wireless network, says IBM.