News
-
"APT Attack Activity Occurs at 'Low, Consistent Hum,' Rapid7 Finds"Security vendor, Rapid7, has a released a quarterly threat intelligence report, outlining analyses of encountered security incidents by customers, which were then handled and managed by the company’s services. This report reveals that advanced persistent…
-
"Patched Flaw in Bosch Diagnostic Dongle Allowed Researchers to Shut Off Engine"Researchers at Argus Cyber Security, a firm dedicated to researching automobile security, has discovered two vulnerabilities within Bosch’s Drivelog Connect OBD-II dongle and the smartphone app that would allow the engine of a vehicle to be shut off or…
-
Cyber Scene #9 - Private Sector Cyber Voices Speak as Congressional Committees Move to Closed SessionsCyber Scene Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaboration and extend its outreach.…
-
"Lightbend to offer security analysis for Scala through HPE Security Fortify integration "Lightbend, the providing company of the Scala programming language and the Reactive application development platform for developing distributed systems, has recently announced its collaboration with HPE Security Fortify to further improve the Scala…
-
"IoT malware clashes in a botnet territory battle"Mirai, the notorious IoT malware, faces new competition as a new malware emerges by the name of “Hajime”. Security researchers have discovered this new malware to be much more resilient than Mirai in that it forms botnets by communicating over a…
-
"How Fog Computing Will Shape The Future Of IoT Applications And Cybersecurity"According to projections made by Markets and Markets, fog computing is predicted to expand at a significant rate during the next five years as a result of the rising demand for IoT device interconnectivity, machine communication, and real-time…
-
"Pentagon, Fearing Cyber Attack, Moves to Find Alternative Comms Network"As tensions rise between the U.S. and North Korea, the Pentagon is seeking to develop an alterative communications network in hopes of protecting the U.S. power grids from potential cyberattacks. Defense Advanced Research Project Agency (…
-
"Apple ransom highlights danger of credential stuffing"On April 7, a group of hackers by the name of “Turkish Crime Family” claimed to have breached Apple’s databases, demanding that Apple pay $75,000 to prevent the leakage of millions of user credentials. Though Apple has stated that their…
-
"Bastille warns radio-based hacks pose risk to national infrastructure"Bastille, leader in enterprise threat detection via software-defined radio, is trying to bring more attention to the potential rise in radio frequency hacking. A recent case sparks concern as a hack was performed through radio frequencies of the Dallas…
-
"Automation Advancement: The Road to Emergent Security AI?"The increasing emergence of big data and IoT is cultivating more ideas for organizations as well as raising concerns about the security of network services and data. ABI Research predicts that security automation could significantly improve security…