Researcher Builds WMI-Based RAT in PowerShell
Security researcher Christopher Truncer released a WMI-based agentless post-exploitation RAT that he developed in PowerShell.
read more
Windows Zero-Day Exploited by AdGholas, Neutrino EK
One of the Windows zero-day vulnerabilities patched by Microsoft this month has been exploited by cybercriminals since last summer, Trend Micro said on Friday.
read more
Google Stops Trusting Symantec-Issued Certificates
Google is displeased with the fact that Symantec has failed to ensure that its partners don’t improperly issue digital certificates, which is why the tech giant has announced its intent to gradually stop trusting all of the company’s existing certificates in Chrome.
read more
IoT Devices are Dramatically Expanding Your Digital Footprint
IoT Devices are Dramatically Expanding Your Digital Footprint IoT devices are the rage for consumers and business alike. While sound business has always been data-driven, consumers have latched onto data and remote control capabilities. IoT devices are convenient, giving us access and availability to things previously not possible unless you were physically in front of the device. They also can produce useful data for us to process and use to make better decisions.
read more
Do You Know Your ABCs?
Ah, RSAC 2017. Into the bowels of Moscone, I dove. Submerged in a calliopean frenzy of schwag hawkers and “where the world talks security” messaging. From the Marvel-esque call to “Be a hero!” to the more existential reminder that “Every moment counts!” I found myself drowning in a sea of Secure! Protect! Defend!
read more
Android Forums Suffers Data Breach
Android Forums, one of the most popular online Android communities, informed members this week that the server hosting its website has been breached, allowing attackers to access some user information.
read more
Apple: CIA’s Mac, iPhone Vulnerabilities Already Patched
Apple Tells WikiLeaks to Submit CIA Exploits Through Normal Process
Apple’s initial analysis of the iPhone and Mac exploits disclosed by WikiLeaks on Thursday shows that the vulnerabilities they use have already been patched. The company told WikiLeaks to send the information it possesses through the regular submission process.
read more
WikiLeaks Releases Data on CIA’s Apple Hacking Tools
read more
Continue readingMocana Launches Industrial IoT Security Platform
As the industrial internet of things (IIoT) begins to revolutionize productivity, so too does it dramatically increase industry's cyber-attack surface. What has been missing is a single platform to provide or enable security across the entirety of IIoT.
read more
Security Improvements Make Android More Attractive to Business
Google Outlines State of Android Security With 2016 Year In Review Report
read more


