A vulnerability found in websites’ cache infrastructure and content delivery networks can be used to spread malware, and an API vulnerability in Mozilla Firefox can be used to have partial control via plug-ins for a DDoS attack.
There has been a sudden surge of memcached servers being abused for DDoS attacks. Proof-of-concept exploit codes have been published, but mitigation techniques and an update from the service provider are also available.
The 2016 threat landscape was riddled with threats that set new record highs: new ransomware families, BEC scams across the world, and vulnerabilities found in widely used platforms. Stay ahead of the current business threats with our latest security roundup.
An in-depth analysis of Shodan data reveals how some of the biggest US cities fare in terms of exposed cyber assets, what this means in terms of security, and how home users and organizations can protect their data.