Companies of all sizes and in every industry use APIs for a staggering range of activities. Just a few examples: APIs make it easy to include weather forecasts in apps, recommend driving routes where you are least likely to have an accident, and allow …
Stealthy Crypto-Mining Malware Evades Detection
A coinminer goes undetected by using Windows Installer as an evasion technique, says Trend Micro.
Threat Actors Exploiting Red Team Tool JexBoss
The NCCIC issued a CERT alert warning of vulnerabilities in the JBoss application server.
IBM’s Watson to Rank Threat Severity for NIST
With thousands of vulnerabilities reported each week, NIST will rely on AI to help with scoring.
Phishing Attempts Soar to 137 Million in Q3
Kaspersky Lab reveals tried-and-tested alongside new scam tactics
Sony DDoS-er ‘DerpTrolling’ Pleads Guilty
Utah man carried out attacks in 2013 and 2014
Canadian Uni Shutters Network After Cryptomining Attack
Incident causes major disruption at St Francis Xavier
Lazarus Group Targets Bank Networks to Rob ATMs
Symantec uncovers Trojan.Fastcash malware used by N. Korean hacker group in ATM attacks
Most IT Security Pros Underestimate Phishing Risks
Survey finds gaps in protections against phishing threats
Nearly 4,000 Breaches Disclosed in 2018
With more than 3.6 billion records exposed thus far, 2018 not expected to reach breach levels of 2017, says Risk Based Security