Cyberattack

Cyberattack / Most Viewed

22,000 New Malware Samples Detected Every Day in 2008, Says New Report

Security firm PandaLabs reports today that it received more malware in the first eight months of 2008 than in the previous 17 years combined -- Trojans being the leading cause of malware infections. In 2008, Panda Security's malware analysis and detection laboratory states that it found an average of 35,000 malware samples each day, 22,000 of which were new infections. By the year's end, the total count of malware threats detected exceeded 15 million. more

Defense Science Board: Cyber Security the Achilles' Heel of US Military Might

Robert O'Harrow of the Washington Post reporting: "Everybody knows by now that cyber security is something of an annoyance, if not a big deal... What most of us fail to appreciate is how big a deal all this really is. That's one of the subtexts of a new report from congressional researchers [PDF] that came Government Inc.'s way. Going by the dry title 'Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,' the report underscores in a compelling way the fact that the nation's cyber vulnerabilities continue to grow, and fast." more

Data Breaches Up Almost 50 Percent in 2008 as Compared to 2007

Businesses, governments and educational institutions reported nearly 50 percent more data breaches last year than in 2007, exposing the personal records of at least 35.7 million Americans, according to a nonprofit group that works to prevent identity fraud. Identity Theft Resource Center of San Diego is set to announce today that some 656 breaches were reported in 2008, up from 446 in the previous year. Nearly 37 percent of the breaches occurred at businesses, while schools accounted for roughly 20 percent of the reported incidents. more

Study Ranks Riskiest Online Cities in US

A recent study by Symantec Norton and Sperling's Best Places has ranked 50 cities in the United States by "Riskiest Online Cities". The study included investigation of a number of factors including... more

France Preparing for Future Cyberwars, Says President

French President Nicolas Sarkozy announced major military reforms involving an in-depth change in strategic priorities and is gradually preparing France for the fights of future. Plans include expanding the range of weapons arsenal in terms of computer warfare, said the president in his announcement this week. France is not alone to be deeply worried about the issue of crippling cyber attacks. In mid-May, the Atlantic Alliance, which brings together dozens of Northern America, Western and Eastern European countries, launched what has come to be known as the "NATO Excellence Center for Cybernetics Defense" in Tallinn, Estonia. more

Code Released by 'Shadow Brokers' Raises Alarming Concerns on Whether NSA Was Hacked

The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. more

Researchers Say Attackers Can Hit Home Routers

If you haven't changed the default password on your home router, do so now. That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code.

...In tests, the researchers were able to do things like change firmware and redirect a D-Link Systems DI-524 wireless router to look up websites from a DNS server of their choosing. more

New York’s Department of Financial Services Issues Cybersecurity Proposal

New York state is proposing new rules requiring banks and insurance companies to establish cybersecurity programs and designate an internal cybersecurity officer. more

Google Chrome Found Vulnerable to Carpet-Bombing

Just hours after the launch of Google's new web browser, reports have surfaced about its security vulnerability to carpet-bombing that can expose Windows users to hacker attacks. If exploited, hackers could potentially run unauthorized software on a victim's computer and then used to execute web-based computer attacks. Researcher Aviv Raff has discovered that it is possible to combine this vulnerability (also at one point affecting Apple Safari which uses the same WebKit technology used by Google's Chrome browser) and a Java bug discussed at this year's Black Hat conference, to trick users into launching executables direct from the new browser. more

Malware Authors, Distributors Increasingly Using Social Networks

Security experts warn the "clickjacking" attack on Twitter service last week is part of growing trend of social engineering attacks via social networks. VP of security firm RSA, Sam Curry, calls the social networking attacks "orthogonal attacks." As users have become aware of phishing attacks and other efforts to get at their personal data, hackers have turned to social networks and "brand attacks," like the recent CNN.com-spoofing Cease-Fire Trojan to spread malware that goes after the same information once installed on the victim's computer. more

Escalating US, Chinese Silent War on the Internet

Jason Mick reporting in DailyTech: "In the definitive cyberpunk novel Neuromancer, published in 1984, author William Gibson prophetically envisioned that wars of the future would be fought over the internet -- a new construct at the time. Today that prediction appears on the verge of coming true as we stand on the threshold of a vast digital battle. Agents in China, believed to be working for, or endorsed by the Chinese federal government are carrying out a secret cyberwar against the U.S. government and U.S. businesses. And that war appears to be escalating." more

Policy Review: Botnets are eWMD, electronic Weapons of Mass Destruction

The latest issue of Policy Review from the Hoover Institution, a public policy research center -- focused on advanced study of politics, economics, and political economy -- has an essay titled eWMDs – electronic weapons of mass destruction. The Policiy Review readers are warned that botnets should be considered a serious security problem and that "cyber attacks present a grave new security vulnerability for all nations and must be urgently addressed." more

Cyberattacks Listed as High-Impact Threat to North American Electric Grid

In a report released today by The North American Electric Reliability Corporation (NERC) and the U.S. Department of Energy (DOE), cyber attacks are among the top high-impact risks -- "with potential to significantly affect the reliability of the North American bulk power system." Certain protections and mitigations are already in place to address these risks, and this study has been released to help public utility commissions, and the federal government to further prepare for these potential risks. more

At Least One U.S. Voting Software Supplier Cyberattacked by Russians, According to Leaked Document

Russia's military intelligence agency launched a cyberattack just days before Election Day 2016 on a U.S. software supplier that provides voting services and systems, according to a top secret report posted Monday by The Intercept. more

Why Passive DNS Matters in Cybersecurity

Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more

Industry Updates

How to Address Blended Threats with Domain Data

Website Categorization: Enhancing URL Filtering for MSSPs

Should Cybersecurity Teams Consider Next-Generation Firewalls?

Can Website Categorization Support Fraud Monitoring?

How Domain Data Can Enrich an MSSP's Threat Intelligence

Using Domain Name Intelligence to Counter E-Commerce Platform Vulnerability Exploit Attacks

4 Cybersecurity Professionals That Can Benefit from Threat Intelligence

How Threat Intelligence Can Solve 3 Common SIEM Problems

New Phishing Tools Can Now Bypass 2-Factor Authentication

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Threat Intelligence: Understanding Adversaries and Threats

Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm

A Snapshot of the Fundamentals of Threat Hunting

Q2 2018 DDoS Trends Report: 52 Percent of Attacks Employed Multiple Attack Types

Q1 2018 DDoS Trends Report: 58 Percent of Attacks Employed Multiple Attack Types