July 27, 2016 Researchers Find Snoops in Tor Anonymity Network With Honey Onions 2 min read - Using a framework called honey onions, researchers detected at least 110 malicious and snooping HSDirs in the Tor anonymity network.
July 27, 2016 Research Shows Wide-Bandwidth DDoS Attacks Are Growing 2 min read - New research by Arbor Networks indicated that DDoS attacks are growing in both size and bandwidth, which is bad news for organizations.
July 26, 2016 Cisco Announces Critical Router Vulnerability < 1 min read - Cisco recently disclosed a critical vulnerability in its software. According to the advisory, no workaround is currently available to resolve the issue.
July 26, 2016 Researchers Say SAP HANA and TREX Have Critical Vulnerabilities 2 min read - Onapsis discovered multiple new vulnerabilities affecting the SAP HANA and SAP TREX applications, including critical and high-risk security flaws.
July 26, 2016 Industrial Espionage Actors Now Serving Up Server Attacks 2 min read - Industrial espionage is on the way up in the age of cloud computing. How can organizations embrace this technology and protect themselves?
July 26, 2016 DEF CON Hacking Challenge: DARPA Goes for Broke 2 min read - Humans will never be fast enough. That's the theory behind the DARPA's upcoming DEF CON hacking contest, the Cyber Grand Challenge (CGC).
July 21, 2016 Petya Ransomware Upgrades Its Crypto 2 min read - The new version of the Petya ransomware features the proper implementation of Salsa20 as well as a more complex preprocessing algorithm.
July 21, 2016 HTTPoxy Can Enable Man-in-the-Middle Attacks 2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
July 20, 2016 Cybersecurity Training for BT Security Employees to Include CISSP and SSCP 2 min read - BT Security will offer its employees the opportunity to pursue ISC2's professional certifications during their cybersecurity training.
July 19, 2016 Phone Verification May Not Catch Premium Number Costs 2 min read - Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.