June 16, 2017 SOX Compliance Is an Ongoing Process 2 min read - Protiviti's "2017 Sarbanes-Oxley Compliance Survey" revealed that companies are dedicating more resources to SOX compliance than in past years.
June 15, 2017 DLP Dangers? Collaboration Violations Put Cloud Security at Risk 2 min read - Data loss prevention (DLP) policies aren't doing enough to combat collaboration tool violations. What does this mean for cloud security?
June 14, 2017 Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner 2 min read - Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
June 13, 2017 Rotten Apples: MacSpy, MacRansom Bring Malware-as-a-Service Model to MacOS 2 min read - The first Mac malware-as-a-service threats suggests attackers are starting to see the operating system as a potential target.
June 13, 2017 New Linux Trojan Discovery Unveils Cryptomining in Raspberry Pi and Identity Cloaking Efforts 2 min read - Two new linux Trojan strains have been discovered: One attempts to mine cryptocurrency, while the other cloaks the threat actor's identity.
June 12, 2017 New Android Cleaning App Pulls Dirty Tricks to Grab Admin Rights 2 min read - A new Android app that claims to clean a device actually grabs admin rights to carry out malicious actions — and proves almost impossible to scrub out.
June 8, 2017 Application Security Report Calls Out Problems in Mobile, IoT Devices and DevOps 2 min read - High-Tech Bridge released a report at InfoSecurity Europe 2017 highlighting some of the fastest growing application security threats to developers.
June 8, 2017 IBM Wins ‘Best Managed Security Service’ at 2017 SC Europe Awards 3 min read - IBM Security had nine entries short-listed for this year's SC Europe Awards. Over time, we've seen the number of IBM entries short-listed increase.
June 7, 2017 Project Shadowfall Helps Tackle RIG Exploit Kit 2 min read - RSA, in collaboration with major security firms and GoDaddy, has identified and eliminated many of the subdomains used in the RIG exploit kit.
June 7, 2017 Database Leak Exposes Millions of Car VINs, Puts Customer Security at Risk 2 min read - The personal information of 10 million U.S. car owners was exposed in a massive leak of car VINs, according to researchers at Kromtech Security.