
NIST has announced the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations–A System Life…




Palo Alto Networks threat intelligence team, Unit 42 has released new research about the cybercriminal Reaper group, suspected by a…


McAfee Researchers Analyse Cryptomining Malware Trend, Windows 10 Cortana Vulnerabilities, Blockchain Attack Vectors, Mobile Billing Fraud Apps, and the Weaponisation…




NIST Requests Public Comments on Draft NISTIR 8228 NIST has released Draft NIST Internal Report (NISTIR) 8228, Considerations for Managing…




NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…


Digital Transformation Barometer finds better security needed to harness the positive potential of AI and mitigate risks of malicious attacks…




Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…


The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…


WatchGuard’s Q2 2018 Internet Security Report uncovers cybercriminals’ heightened use of credential-focused attacks, the continued prevalence of malicious Office documents,…




Recent research by Palo Alto Networks Unit 42 Email Link Analysis (ELINK) has revealed that between April – June 2018,…