This year’s compilation features well-known ransomware, botnet, and cryptomining software. Just in time for Halloween comes Webroot’s list of the nastiest malware of 2019, filled with attacks and exploits that include ransomware, phishing attacks, botnets, cryptomining, and cryptojacking. Among the mentions, Emotet, Trickbot, and Ryuk are cited as “the most frightening ransomware triple threat,” according to
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities. MITRE today published a draft of the Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors, a list of the most widespread and critical weaknesses that could lead to severe software vulnerabilities, as the organization explained a release
OWASP’s new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications. The Open Web Application Security Project (OWASP) has unveiled its first release candidate for a top 10 list focused on the most critical classes of security issues affecting the communications between
A new report from HackerOne lists the top five companies running bug-hunting programs on the ethical hacking platform. Companies have found that they can expand the logical size of their security teams by recruiting white-hat hackers to find vulnerabilities in their applications and networks. Many of these companies pay a bounty for legitimate discoveries and
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals. It should come as no surprise that cybercriminals favored Microsoft Office vulnerabilities in their cyberattacks last year, given the rise in phishing attacks that included rigged Word and Excel Office file attachments. Eight of the top 10 most exploited vulnerabilities in 2018
Supply Chain Insights recently conducted a survey with the objective to understand the “current and expected future state of supply chain risk management, the biggest drivers of risk, and the impact on supply chain disruptions.” While nearly two-thirds of respondents believe their company performs better today on risk management practices than five years ago, they
New Strategies In Threat Defense and Response Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your personal data click here.
As data breaches go, 2018 did not disappoint. While the year kicked off with the discovery of the Meltdown and Spectre viruses at the beginning of January, 2018 will be remembered as the year a dark shadow was cast over Facebook for having to announce not one…not two, but three breaches. On March 17th, British