Infosecurity News

Researchers Discover Rare Form of Malware that Targets VoIP Softswitches

Researchers Discover Rare Form of Malware that Targets VoIP Softswitches

A new type of Linux malware is designed to target a specific VoIP platform

ThreatConnect Acquires Nehemiah Security to Add Risk Quantifier Capabilities

ThreatConnect Acquires Nehemiah Security to Add Risk Quantifier Capabilities

Acquisition will add cyber-risk quantification to threat intelligence and SOAR technologies

Healthcare SMEs Get Government Security Spending Boost

Healthcare SMEs Get Government Security Spending Boost

Support package will help with certification costs

ETERBASE Crypto-Exchange Hit in $5m Heist

ETERBASE Crypto-Exchange Hit in $5m Heist

Six hot wallets raided for digital funds

Bluetooth Bug Could Allow MITM Attacks

Bluetooth Bug Could Allow MITM Attacks

Exploiting BLURtooth enables attackers to overwrite encryption keys

Employee Social Media Use Viewed as Risky

Employee Social Media Use Viewed as Risky

Small business owners fear employee social media use is a security threat

Judge Dismisses Privacy Lawsuit Against University of Chicago

Judge Dismisses Privacy Lawsuit Against University of Chicago

Privacy lawsuit against University of Chicago, UChicago Medicine and Google is dismissed

Bank of England to Tackle Cybercrime

Bank of England to Tackle Cybercrime

Bank of England to prioritize tackling cybercrime and ensuring payment security

Fake Alert Scams Increasingly Targeting Mobile Networks

Fake Alert Scams Increasingly Targeting Mobile Networks

The “vast majority” of fake alerts in malvertising networks target mobile browsers

Businesses Fear Insider-Enabled Data Breaches

Businesses Fear Insider-Enabled Data Breaches

Over three quarters of businesses fear their organization will suffer a data breach

BlackBerry Launches Dedicated EU Data Centers to Comply with GDPR

BlackBerry Launches Dedicated EU Data Centers to Comply with GDPR

New data centers will be located in the Netherlands and France

Critical Bugs Could Enable OT Supply Chain Attacks

Critical Bugs Could Enable OT Supply Chain Attacks

Claroty finds six CVSS 10.0 vulnerabilities in third-party code

What’s Hot on Infosecurity Magazine?