Infosecurity News

  1. RedisWannaMine Uses NSA Exploit to Up the Crypto-Jacking Game

    A new generation of crypto-jacking significantly improves on the unsophisticated mining campaigns seen so far.

  2. SIA Launches Women in Security Forum

    The forum will focus on programs, professional development and networking to expand female representation.

  3. Slingshot APT Actor Shoots onto the Scene

    The likely state-sponsored group is taking aim at the Middle East and Africa.

  4. Universities Lag in DMARC Adoption

    Only 11.2% have adopted the DMARC email security framework.

  5. China Backdated Bug Disclosures to Hide State Hacking: Report

    Don’t trust Beijing’s national vulnerability database, says Recorded Future

  6. ICO Raids Addresses in Nuisance Text Investigation

    Consumers bombarded with 11 million unsolicited SMS messages

  7. Massive Coin-Mining Attempt Targets Nearly Half a Million PCs

    Dofoil uses a customized mining application that supports NiceHash, so it can mine different cryptocurrencies.

  8. Hidden Cobra Coils and Strikes at Turkish Banks

    The campaign is using the Bankshot malware implant.

  9. Memcached Flaw Kill Switch Could Foil DDoS-ers

    Countermeasure said to be 100% effective on attacking servers

  10. US DHS Slammed for Infosecurity Deficiencies

    OIG report highlights systemic weaknesses

  11. EFF: FBI Paid Geek Squad Employees as Informants

    Rights group has concerns over possible Fourth Amendment violations

  12. Half of All Orgs Hit with Ransomware in 2017

    Of the companies that refused to pay the ransom, a full 87% recovered their data.

  13. FlawedAmmyy RAT Takes Over Desktops

    The RAT creates opportunities for actors to steal customer data, proprietary information and more.

  14. Mobile Ad Trojans Evolve to Maximize Profits

    With root privileges, they can secretly install various applications or bombard an infected device with ads to make use of the smartphone impossible.

  15. Experts: UK Gov’s IoT Security Guidelines Must Go Further

    Security industry wants more than voluntary guidelines

  16. Two-Thirds of IT Leaders Consider Consumer-Grade Access to Workplace Cloud Services

    Nine in 10 IT decision makers think ineffective cloud access management creates issues for the business

  17. Dark Web Experts: ID Fraudsters Unaffected by Police Efforts

    AlphaBay/Hansa takedown has forced scammers to be more creative, says Terbium Labs

  18. New Record 1.7Tbps DDoS Also Abused Memcached Servers

    Experts urge organizations to correct insecurely configured systems

  19. Kaspersky Lab Adds $100K Payout to Bug Bounty Program

    The new top-end award will be for the discovery and responsible disclosure of severe vulnerabilities in some of the firm’s flagship products.

  20. Gozi Trojan Turns to Dark Cloud Botnet

    The campaigns are relatively low volume and targeted to specific organizations, with some of the mails even being localized.

What’s hot on Infosecurity Magazine?