Tens of thousands affected after staff member is phished
Yes, My Name is ||
Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name “Or”. I fact, my name has different meanings in different languages. In English the meaning of “Or” is funct…
#UNITEDsummit: Heisenberg Project Outlines Cloud Attack Realities
Honeypots analyzed attacks inside AWS, Microsoft Azure, Digital Ocean, Google Cloud, Rackspace and IBM SoftLayer.
Kremlin Hackers Are Exploiting Microsoft’s Unpatched Zero-Day
Russia’s politically motivated Fancy Bear group is actively using the flaw—and a patch won’t be available until Election Day.
Google to Distrust WoSign/StartCom Certificates
WoSign knowingly and intentionally mis-issued certificates in order to circumvent browser restrictions and CA requirements.
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.
MI5 Boss Warns of ‘Aggressive’ Russian Cyber Threat
Andrew Parker claims Kremlin is on the offensive
Google AI Can Create Its Own Encryption
Google Brain has shown that artificial intelligence has the ability to create its own cryptography standard, dynamically.
Flash, Windows Zero-days Are Being Actively Exploited in the Wild
Microsoft hasn’t patched the Windows flaw—a local privilege escalation that can be used as a security sandbox escape.
Fake Palo Alto Cyber-conference Invites Deliver Spy Trojan
The effort is related to ongoing Operation Lotus Blossom attack campaigns in the Asia Pacific region.