DDoS Mitigation – Choosing a Cloud-based solution
An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their prevalence, DDoS (Distributed Denial of Service)...
View ArticleCyberespionage – Chinese Hackers targeting US Cloud service providers
U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China Economic and Security Review Commission...
View ArticleLinkedIn – Surge of fake profiles and increment of illicit activities
LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of fake profiles. LinkedIn is considered the social network of...
View ArticleSERT Q4 2013 Threat Intelligence Report on threat landscape evolution
Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat...
View ArticleHackers exploit cloud services to build Money-Mining Botnet
Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud...
View ArticleShadow Cloud Services a serious risk for Government Networks
Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that...
View ArticleThe US government created new rules for Cloud Providers
A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of...
View ArticleZeroDB, the end-to-end encrypted database, goes open source
The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to the community with your experience. While politicians and experts are...
View ArticlecuteRansomware leverages Google Docs to avoid detection
A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomware, dubbed...
View ArticleCloudFanta Malware Steals Banking Information Via Cloud Storage Apps
Watch out, threat research labs Netskope spotted the CloudFanta Malware Stealing Banking Information Via Cloud Storage Apps. Threat Research Labs, Netskope, published a detailed research on the malware...
View ArticleNSA warns of cloud attacks on authentication mechanisms
The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks to cloud infrastructure. The US National Security Agency has published...
View ArticleNew Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and...
The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and Redis installs. The cybercrime group Rocke is using a new piece of...
View ArticleCritical Microsoft Azure RCE flaw impacted multiple services
Researchers found a new critical remote code execution (RCE) flaw impacting multiple services related to Microsoft Azure. Researchers from Ermetic found a remote code execution flaw, dubbed...
View Article
More Pages to Explore .....