Source: cyberdefensemagazine.com

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues – Cyber Defense Magazine

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues – Cyber Defense Magazine

Hackers are offering Equifax data for sale, but they are scammers

Hackers are offering Equifax data for sale, but they are scammers

US Government website was hosting a JavaScript downloader delivering Cerber ransomware

US Government website was hosting a JavaScript downloader delivering Cerber ransomware

OpenAI Gym – A machine learning system creates ‘invisible’ malware

OpenAI Gym – A machine learning system creates ‘invisible’ malware

The Strategic CISO: Learning from the Experts of War

The Strategic CISO: Learning from the Experts of War

Three Mobile Customers in UK Experience Data Breach Once Again

Three Mobile Customers in UK Experience Data Breach Once Again

A Twitter Bug Allowed Hackers Access to Locked Accounts Until October

A Twitter Bug Allowed Hackers Access to Locked Accounts Until October

Operation Kingphish: Targeted Against Human Rights Activists in Qatar and Nepal

Operation Kingphish: Targeted Against Human Rights Activists in Qatar and Nepal

Western Union Undertakes to Pay $586 Million to Settle Fraud Charges

Western Union Undertakes to Pay $586 Million to Settle Fraud Charges

The Reason Why Yahoo! Data Breach Need Not Have Happened

The Reason Why Yahoo! Data Breach Need Not Have Happened

Variant of the Sundown Exploit Kit Leverages Steganography to Hide Code

Variant of the Sundown Exploit Kit Leverages Steganography to Hide Code

An Alpha Version of the Sandboxed Tor Browser Released by Tor Project

An Alpha Version of the Sandboxed Tor Browser Released by Tor Project

CryptoLuck Ransomware Spread Through the RIG-E Exploit Kit

CryptoLuck Ransomware Spread Through the RIG-E Exploit Kit

Bypassing Two-Factor Authentication on Outlook Web Access

Bypassing Two-Factor Authentication on Outlook Web Access

LDAP as Attack Vector Could Power Terabit-Scale LDAP DDoS Attacks

LDAP as Attack Vector Could Power Terabit-Scale LDAP DDoS Attacks

Experts Devised a Method to Capture Keystrokes During Skype Calls

Experts Devised a Method to Capture Keystrokes During Skype Calls