Attack Attribution Tricky Say Some as US Blames North Korea for...

There's not enough evidence to conclusively tie the rogue regime to the ransomware attacks, some security experts say.

Census Records Leaked in Marketing Firm’s Exposure of 123 Million Households

Database in unsecured AWS storage bucket owned by marketing analytics firm Alteryx included 248 data fields on each household, but no names.

Five Arrested for Cerber, CTB-Locker Ransomware Spread

Authorities arrest three Romanian suspects for spreading CTB-Locker malware and two for a ransomware case linked to the United States.

Security Worries? Let Policies Automate the Right Thing

By programming 'good' cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line.

Another Cyberattack Spotted Targeting Mideast Critical Infrastructure Organizations

Operation Copperfield appears focused on data theft and reconnaissance, Nyotron says.

Microsoft Office Docs New Vessel for Loki Malware

Loki malware, built to steal credentials, is distributed via Microsoft Excel and other Office applications rigged with malicious 'scriptlets' to evade detection.

New Database Botnet Leveraged for Bitcoin Mining

Attackers are quietly building an attack infrastructure using very sensitive machines.

Massive Cloud Leak Exposes Alteryx, Experian, US Census Bureau Data

A misconfigured Amazon Web Services S3 storage bucket exposed sensitive data on consumers' financial histories, contact information, and mortgage ownership.

Trump Adviser: North Korea Waged WannaCry Attack

White House declares the North Korean government as perpetrators of the epic ransomware attack that spread around the globe in early May.

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.

‘Starwars’ Debuts on List of Worst Passwords of 2017

Many of the old standbys made this year's list of the 25 stolen - and weakest - passwords found dumped online.

Telegram RAT Escapes Detection via Cloud Apps

Netskope discovers a new RAT using Dropbox for its payload host and Telegram Messenger for command and control.