Current Security Alerts
Below is a live feed, collated from lots of different sources.
Alerts and Advice

The Realities of Extended Detection and Response (XDR) Technology
While the term XDR has become pervasive, the technology and market…

Universities Face Double Threat of Ransomware, Data Breaches
Lack of strong security policies put many schools at risk of…

Cartoon Caption Winner: Be Careful Who You Trust
And the winner of The Edge's February cartoon caption contest…

3 Security Flaws in Smart Devices & IoT That Need Fixing
The scope and danger of unsecured, Internet-connected hardware…

Botnet Uses Blockchain to Obfuscate Backup Command & Control Information
The tactic makes it much harder for defenders to take down botnets…

Babuk Ransomware
Executive Summary
Babuk ransomware is a new ransomware threat…

SolarWinds Attackers Lurked for 'Several Months' in FireEye's Network
Top execs from FireEye, SolarWinds, Microsoft, and CrowdStrike…

Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Also on Krebs' radar: the cyber-response to COVID-19 and intelligence-sharing…

SonicWall Releases Second Set of February Firmware Patches
The latest patches, for its SMA 100 series products, comes less…

10K Targeted in Phishing Attacks Spoofing FedEx, DHL Express
The two campaigns aimed to steal victims' business email account…

Augmenting SMB Defense Strategies With MITRE ATT&CK: A Primer
Any organization can use MITRE ATT&CK as a force multiplier,…

Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
When siloed functions unite in the face of cyberthreats, organizations…

CVSS as a Framework, Not a Score
The venerable system has served us well but is now outdated.…

Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool
APT31 cloned and reused a Windows-based hacking tool for years…

Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Almost four of every five attacks attributed in 2020 were conducted…

Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims
FireEye Mandiant says it discovered data stolen via flaw in Accellion…

Researcher Reports Vulnerability in Apple iCloud Domain
A stored cross-site scripting vulnerability in the iCloud website…

Sequoia Capital Suffers Data Breach
The attack began with a successful phishing email.

8 Ways Ransomware Operators Target Your Network
Security researchers explore how criminals are expanding their…

What Can Your Connected Car Reveal About You?
App developers must take responsibility for the security of users'…
Other Tools
Dashboard
Your live dashboard of feeds, tools and information
VirusTotal
Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community
Assessment
Book in your initial assessment



