Current Security Alerts

Below is a live feed, collated from lots of different sources.

Alerts and Advice

The Realities of Extended Detection and Response (XDR) Technology

While the term XDR has become pervasive, the technology and market…

Universities Face Double Threat of Ransomware, Data Breaches

Lack of strong security policies put many schools at risk of…

Cartoon Caption Winner: Be Careful Who You Trust

And the winner of The Edge's February cartoon caption contest…

3 Security Flaws in Smart Devices & IoT That Need Fixing

The scope and danger of unsecured, Internet-connected hardware…

Botnet Uses Blockchain to Obfuscate Backup Command & Control Information

The tactic makes it much harder for defenders to take down botnets…

Babuk Ransomware

Executive Summary Babuk ransomware is a new ransomware threat…

SolarWinds Attackers Lurked for 'Several Months' in FireEye's Network

Top execs from FireEye, SolarWinds, Microsoft, and CrowdStrike…

Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel

Also on Krebs' radar: the cyber-response to COVID-19 and intelligence-sharing…

SonicWall Releases Second Set of February Firmware Patches

The latest patches, for its SMA 100 series products, comes less…

10K Targeted in Phishing Attacks Spoofing FedEx, DHL Express

The two campaigns aimed to steal victims' business email account…

Augmenting SMB Defense Strategies With MITRE ATT&CK: A Primer

Any organization can use MITRE ATT&CK as a force multiplier,…

Security + Fraud Protection: Your One-Two Punch Against Cyberattacks

When siloed functions unite in the face of cyberthreats, organizations…

CVSS as a Framework, Not a Score

The venerable system has served us well but is now outdated.…

Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool

APT31 cloned and reused a Windows-based hacking tool for years…

Cybercrime Groups More Prolific, Focus on Healthcare in 2020

Almost four of every five attacks attributed in 2020 were conducted…

Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims

FireEye Mandiant says it discovered data stolen via flaw in Accellion…

Researcher Reports Vulnerability in Apple iCloud Domain

A stored cross-site scripting vulnerability in the iCloud website…

Sequoia Capital Suffers Data Breach

The attack began with a successful phishing email.

8 Ways Ransomware Operators Target Your Network

Security researchers explore how criminals are expanding their…

What Can Your Connected Car Reveal About You?

App developers must take responsibility for the security of users'…

Other Tools

  • Dashboard

    Your live dashboard of feeds, tools and information

  • VirusTotal

    Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community

Quick Links

working from home

Latest Exclusive Article

Connect

  • PO Box 559 North Sydney NSW 2059
  • 1800 961 616
  • info@recontech.com.au
  • recontech.com.au

© Recon Technologies Pty Ltd 2020   |   All rights reserved   |   Site by Ripple Marketing Australia