Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems. While no attacks have been seen in the wild, no patch for the wormable flaw is yet available. A workaround exists for servers, but not clients.
Microsoft along with its partners from 35 countries has taken coordinated legal and technical action to disrupt Necurs, one of the largest botnets in the world, the company announced in a Tuesday blog post.
The U.S. is better prepared to respond to election interference and related cybersecurity issues than it was four years ago, several security professionals, including one of the FBI's top experts, tell Information Security Media Group.
Organizations have been scrambling to comply with the California Consumer Privacy Act before enforcement begins in July, say Caitlin Fennessy, research director of the International Association of Privacy Professionals, and Dominique Shelton Leipzig, a partner at Perkins Coie LLP.
In an in-depth interview, two cybersecurity experts at Akamai Technologies India discuss ensuring security for at-home workers during the COVID-19 crisis and offer business continuity insights.
The attack surface is constantly expanding, with threats continuing to keep pace with the evolution in infrastructure and digital transformation, says Leah MacMillan, chief marketing officer of Trend Micro.
Reducing security complexity remains one of the toughest challenges facing CISOs, driven by the non-stop increase in threats, says Jeff Reed senior vice president of product at Cisco Security Business. Creating a sustainable solution will require advances in vendor interoperability, as well as automation and...
As COVID-19 spreads, cybercriminals are sending more phishing emails that use the health emergency as a lure, according to security researchers. The European Central Bank is among those issuing warnings.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.
Careless and malicious insiders, overly complex IT infrastructure and having an excess of privileged users continue to pose serious risks to the integrity of corporate cybersecurity practices, says Timothy Brown of SolarWinds.
The state of endpoint security might appear good at first glance, but look below the surface and the situation may not be as rosy as it seems, says Christy Wyatt, CEO of Absolute, based on her company's new "2020 Endpoint Resilience Report."
Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years. Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector.
Today's "deepfake" technology makes the voice channel a nascent avenue for fraud. Mark Horne of Pindrop describes new threats to interactive voice recognition channels.
As consumers and organizations demand more stringent identity and access management controls, self-sovereign identity management can play a critical role, says Heather Dahl of the Sovrin Foundation.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.