malware
AI-Based Cyber Defenses Secure Drones From Zero-Day Attacks
Vulnerable to hacking, drones are getting another layer of defense via an AI-based cybersecurity approach that promises to shield the flying edge devices from zero-day attacks. SparkCognition, an industrial ...Full Article
Cyber Defenses Get an AI Boost
Greater access to big data and HPC resources are enabling enterprise use of emerging AI tools and machine learning models to help protect corporate networks and secure enterprise applications. ...Full Article
Open Source Survey Reviews Project Security and Sustainability Issues
A Linux Foundation report on trends in open-source software development assesses the factors driving contributors while urging more incentives to secure code and sustain community-based projects. The document, "Report ...Full Article
Hackers Target Chip Makers
Another indication of the strategic importance of the foundational semiconductor industry is a recent surge in cyberattacks directed at global chip manufacturers. Security researchers in Taiwan reported earlier this ...Full Article
Russian Malware Targets Linux, US Warns
The Russians are coming, again, this time with new malware targeting Linux systems, according to a U.S. advisory issued this week. The FBI and the U.S. National Security Agency ...Full Article
‘Shadow IoT’ Undermining Network Security
The majority of Internet of Things transactions are unsecured, adding a new enterprise security threat as industrial and retail IoT traffic begins to ramp up. An enterprise IoT survey ...Full Article
Updated: Worm Hits Docker Containers
A crypto-jacking worm, so-called because it spreads in spurts among unsecured images on servers, is said to be the first detected using Docker application containers. Palo Alto Network’s (NYSE: ...Full Article
Malware Goes ‘Polymorphic’
Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher ...Full Article
Hybrid Clouds Remain Unsecured as New Threats Emerge
The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams ...Full Article
Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware
A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article