Zephyrnet Logo

Cyber Security

New Standards Set to Reshape Future of Email Security

Emerging specs and protocols expected to make the simple act of opening an email a less risky propositionEmail is one of the most successful...

Lessons Learned: The Cautionary Tales Of Enterprise Cyber-Attacks

Reflecting on the past 12 months of enterprise cyber security incidents, there was no single attack vector and no one-size-fits-all security solution. We compiled...

Email Phishing Overshadows Risk Of Mobile Malware

Put quite frankly: Mobile devices demand diligence at the CISO level. In fact, like the mobile device’s counterpart, workstations and laptops, many loaded malware...

Happy 10th Birthday, KrebsOnSecurity.com

Today marks the 10th anniversary of KrebsOnSecurity.com! Over the past decade, the site has featured more than 1,800 stories focusing mainly on cybercrime, computer...

DHS Warns of Potential Iranian Cyberattacks

Recent US military action in Baghdad could prompt retaliatory attacks against US organizations, it says.Concerns about an Iranian cyber response to the recent American...

3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group

Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone—even if downloaded from the official...

Resurgent Iron Liberty Targeting Energy Sector

The following analysis was compiled and published to Threat Intelligence clients in September 2018. The Secureworks® Counter Threat Unit™ (CTU) research team is publicly...

Finding a Weak Link in the Chain

On October 4, 2018, a Bloomberg Businessweek article alleged that in 2015, manufacturers inserted microchips onto the motherboards of servers destined for U.S. public...

What to Expect in Cybersecurity for 2019

Security professionals are tasked with outwitting adversaries and mitigating risk in a threat landscape that's evolving faster than ever before. The stakes are high,...

Snake ransomware tries to slither its way into enterprise networks

Add yet another malicious encryption program to the expanding ranks of ransomware programs that target large enterprise networks in hopes of scoring big...

Retail Point-Of-Sale Malware Hits Landry’s Restaurant Group

Consumer and commercial payment cardholders believe that their card and personally identifiable information (PII) will be safe when making transactions. However, the lack of...

The Hidden Cost of Ransomware: Wholesale Password Theft

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any...

Latest Intelligence

spot_img
spot_img