Archive

Migrating enterprise resource planning (ERP) applications to the cloud can provide cost savings to companies and simplify these business-critical workloads. But it also adds security risks. The Cloud Security Alliance (CSA), a coalition of security vendors, service providers, and other

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked, not for the purpose of harming you but rather to

Security researchers have discovered a custom-built piece of malware wreaking havoc in Asia for several months that could signal the return of the notorious Chinese hacker group – Iron Tiger. According to researchers at Bitdefender, attacks by Operation PZChao have

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks. Jetpack is a popular plug-in that offers free website optimization, management and security features. It

DCShadow attack allows installation of backdoor. Hackers could set up their own fake domain controller in an existing corporate network to distribute malware and leave a backdoor. Security researchers Benjamin Delpy and Vincent Le Toux demonstrated an attack on Microsoft

Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices. “As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts,” its creator, who goes by