Free Scanner Finds 50,000 EternalBlue-Vulnerable Systems

More than 50,000 computers vulnerable to the NSA-linked EternalBlue exploit were found by a free vulnerability scanner in recent weeks. Dubbed Eternal Blues, the tool was designed to provide network administrators with visibility into the EternalBlue-vulnerable machines in their networks, but without actually exploiting the flaw. In the wake of WannaCry, NotPetya, and other global infectionsleveraging the NSA-linked exploit, knowing whether…

Man stole bitcoin by phishing individuals on the dark web

Michael Richo, a 35-year-old from Connecticut, had the brilliant idea of stealing bitcoin from people involved in illegal deals through dark web marketplaces. Perhaps he thought that he would be safe from law enforcement if he stuck to robbing potential criminals but, as it turns out, he was wrong. Richo’s modus operandi was as follows:…

Medical devices at risk: 5 capabilities that invite danger

Medical device cybersecurity is lousy — beyond lousy. Indeed, the word from security experts for most of the past decade (and certainly since those devices increasingly have become connected to the internet) has been that while the physical security of most is superb and the devices function flawlessly, possibly for years at a time, when…

Why WannaCry Was a Wake Up Call for Critical Infrastructure Security

The WannaCry ransomware attack impacted more than 10,000 organizations in 150 countries, including manufacturing and industrial organizations like Nissan, Renault and Dacia, Spanish Telefónica and Deutsche Bahn. It’s likely that a fair number of industrial organizations have been impacted, but haven’t reported the incidents since they are not required to do so by regulatory requirements.

Google’s whack-a-mole with Android adware continues

Why can’t Google put a stop to adware on their official Android app marketplace? The analysis by Trend Micro researchers of a Trojan Android ad library dubbed Xavier tells the story. The Xavier ad library is third stage of evolution of the AdDown family, which was initially able to install apps behind the user’s back,…

How Smart Cities Can Minimize the Threat of Cyber Attacks

As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities. In the not-so-distant future, smart cities will weave the Internet of Things (IoT) and interconnected devices into existing technology infrastructure to bring entire communities online. Singapore, for example, recently launched its Smart Nation program, deploying citywide…

How vulnerability research benefits both vendors and customers

Zero-day vulnerabilities – newly discovered exploits that haven’t been previously identified – are now emerging more often. Worse still is the fact that these dangerous flaws sometimes aren’t pinpointed until hackers have already exploited them. According to a prediction from Cybersecurity Ventures founder and Editor-in-Chief Steven Morgan, the frequency of zero-day exploits – which were a…