1 342 343 344 345 346 401 2408 / 2805 POSTS

Apache Struts 2 exploit allows ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers.The SANS I ...
Chrome Tackles ‘Friendly Fire’ To Keep Browser Safe

Chrome Tackles ‘Friendly Fire’ To Keep Browser Safe

MIAMI— What is life like in the security trenches inside Google’s Chrome browser security team? From the perspective of Justin Schuh, lead engineer of ...
U.S. trade lobbying group attacked by suspected Chinese hackers

U.S. trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports ...
Building a strategic threat intelligence program

Building a strategic threat intelligence program

Jon Oltsik, an analyst at Enterprise Strategy Group in Milford, Mass., looked back at ESG research conducted in 2015 on strategic threat intelligence ...
F-Secure buys Little Flocker to combat macOS ransomware

F-Secure buys Little Flocker to combat macOS ransomware

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has acquired Little Flocker, a macOS applicatio ...
Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

The author of a banking Trojan called Nuclear Bot — a teenager living in France — recently released the source code for his creation just months after ...
Top 5 email security best practices to prevent malware distribution

Top 5 email security best practices to prevent malware distribution

A trusted channel Email is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employ ...
1 342 343 344 345 346 401 2408 / 2805 POSTS