Zephyrnet Logo

Cyber Security

Three Key Steps to Help Protect National Infrastructure

A “cyber-Pearl Harbor.” The warning from then Secretary of State Leon Panetta was stark. America was increasingly vulnerable to cyber-attacks from aggressor nation states...

Ransomware hits, but doesn’t stop, the Pittsburgh Unified School District

The Pittsburgh Unified School District is still recovering from a ransomware attack that took place over the holiday recess, but its superintendent says school is...

Public Cloud Platforms – A Honey Pot For Threat Actors

Today, the shape of the enterprise is changing; that it is to say in sync with cloud capabilities. Workloads are steadily migrating there –...

Ransomware at IT Services Provider Synoptek

Synoptek, a California business that provides cloud hosting and IT management services to more than a thousand customers nationwide, suffered a ransomware attack this...

New Standards Set to Reshape Future of Email Security

Emerging specs and protocols expected to make the simple act of opening an email a less risky propositionEmail is one of the most successful...

Lessons Learned: The Cautionary Tales Of Enterprise Cyber-Attacks

Reflecting on the past 12 months of enterprise cyber security incidents, there was no single attack vector and no one-size-fits-all security solution. We compiled...

Email Phishing Overshadows Risk Of Mobile Malware

Put quite frankly: Mobile devices demand diligence at the CISO level. In fact, like the mobile device’s counterpart, workstations and laptops, many loaded malware...

Happy 10th Birthday, KrebsOnSecurity.com

Today marks the 10th anniversary of KrebsOnSecurity.com! Over the past decade, the site has featured more than 1,800 stories focusing mainly on cybercrime, computer...

DHS Warns of Potential Iranian Cyberattacks

Recent US military action in Baghdad could prompt retaliatory attacks against US organizations, it says.Concerns about an Iranian cyber response to the recent American...

3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group

Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone—even if downloaded from the official...

Resurgent Iron Liberty Targeting Energy Sector

The following analysis was compiled and published to Threat Intelligence clients in September 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly...

Finding a Weak Link in the Chain

On October 4, 2018, a Bloomberg Businessweek article alleged that in 2015, manufacturers inserted microchips onto the motherboards of servers destined for U.S. public...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?