UpdateAgent malware variant impersonates legitimate macOS software

The new variant of UpdateAgent malware is also capable of dropping adware against macOS. The IT security researchers at Microsoft Security Intelligence have discovered a new variant of  UpdateAgent (aka…

More Generation Zs Are Falling for Online Scams

Security Intelligence – Security Intelligence – More Generation Zs Are Falling for Online Scams It’s sometimes easy to think phishing or vishing scams only work on people who aren’t very…

Help Net Security Publishes a Report on Extended Detection and Response (XDR)

Help Net Security, an independent site focusing on information security, has recently started a new series of reports in order to help CISOs worldwide choose what’s best for their organization when…

CISA Creates JCDC Agency for U.S. Cyber Defense Operations Plans

Security Intelligence – Security Intelligence – CISA Creates JCDC Agency for U.S. Cyber Defense Operations Plans The Cybersecurity and Infrastructure Security Agency (CISA) announced the creation of a new agency…

High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds

Security Intelligence – Security Intelligence – High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds Businesses and agencies today are spending an average of about 250 days to…

Time to patch: Vulnerabilities exploited in under five minutes?

Once upon a time, there was the zero-day vulnerability. Then came zero-hour vulnerabilities; now, the time to attack is shrinking, and exploits to vulnerable systems happen in minutes, not days.…

What is a security champion? Definition, necessity and employee empowerment [Updated 2021]

A new kind of hero: Security champion In today’s world of malware, ransomware, hacking, phishing and other never-ending threats, the need for employee vigilance has never been greater. How does…

Japan’s IoT scanning project looks for vulnerable IoT devices

The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and…

Can legislation save IoT security?

Introduction: The state of IoT security As noted in a Gemalto report on the State of IoT Security, it was found that almost half of companies couldn’t tell if their…

Top 10 Free Threat-Hunting Tools

Threat hunting is an alternative approach to dealing with cyber-attacks, compared to network security systems that include appliances such as firewalls that monitor traffic as it flows through a system.…