Dark
Top 5 Attack Techniques May Be Easier to Detect Than You Think

New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years. ...

Read more
Dark
Google Updates on Campaign Targeting Security Researchers

Attackers linked to North Korea began to target security researchers on social media earlier this year. ...

Read more
Dark
Weakness in EDR Tools Lets Attackers Push Malware Past Them

A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows. ...

Read more
News
Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What's Next

You're fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution.
But...

Read more
Infosec
Are you prepared to prevent data loss?

From losing cherished memories to missing deadlines, the impact of not having backups when a data disaster strikes can hardly be overstated The post Are you prepared to prevent data loss? appeared first on WeLiveSecurity

Read more
News
Hackers are implanting multiple backdoors at industrial targets in Japan

Cybersecurity researchers on Tuesday disclosed details of a sophisticated campaign that deploys malicious backdoors for the purpose of exfiltrating information from a number of industry sectors located in Japan.
Dubbed "A41APT" by...

Read more
Dark
Security on a Shoestring? More Budget Means More Detection

Companies that spend the smallest share of their IT budget on security see fewer threats, but that's not good news. ...

Read more
News
GAO Report Identifies Need for DOE to Address Risks to Electrical Distribution System

The United States Government Accountability Office (GAO) recently completed and published a study on electricity grid cybersecurity that concluded that the Department of Energy (DOE) needs to ensure its plans fully...

Read more
Infosec
Backdoor added to PHP source code in Git server breach

Had the incident gone unnoticed, the attackers could have taken over websites using the tainted code The post Backdoor added to PHP source code in Git server breach appeared first on WeLiveSecurity

Read more
News
Critical Flaw Found In Widely Used Netmask Open Source Module

An IP address parsing flaw in the netmask NPM module affects hundreds of thousands of applications that rely on it. But that may be just the tip of the iceberg, researchers...

Read more