simply-security-logo

 

  • SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry
    The SHA-1 hash function is broken. This isn’t news. What is news is that a practical attack has been demonstrated  Keep in mind that “practical” is used in cryptographers terms and those terms don’t necessarily have an impact on your daily IT use. The news has been making the rounds as IT teams, journalists, and...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 20, 2017
    I’ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the total exploit kit activity for 2015. But now it’s presumed dead as of June 2016 after the arrest of a hacker gang....
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Fake apps, fake games: An update on gaming malware
    Mobile gaming malware is a huge concern - and thus it's important to take note of how these kinds of malicious programs can be guarded against.
  • Healthcare Under Attack: Trend Micro Reveals All in New Report
    Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation state attacks. In 2015, more than 113 million records were stolen in the U.S. alone, according to the Department of Health...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 13, 2017
    Love was in the air earlier this week. This past Tuesday was Valentine’s Day and what should have been Microsoft’s “Patch Tuesday,” but it was reported last month that Patch Tuesday would never be the same as Microsoft moves to a process that includes an online searchable database and automatic updates. I was wondering...
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Bad Choices, Exposed Data
    Our researchers produce a lot of really interesting material. This week, they published a paper called, “U.S. Cities Exposed In Shodan.” The research looks systems that are exposed online…exposure that systems owners aren’t always aware of. The most disturbed statistic in the research is a simple...
  • Devices Exposing Critical Industries and U.S. Cities
    As connected devices continue to intertwine with daily life, the security of those devices and the information they process is a growing conversation. To gain a better understanding of cyber assets exposed to the internet, Trend Micro researchers took a comprehensive look at the exposed assets in the 10 largest U.S....
  • Moving To Serverless Cloud Apps
    One of the key benefits of the cloud is focus. Spinning up a virtual server in the cloud lets you focus on the operations and security of the operating system, you applications, and your data. Similarly migrating to a SaaS productivity suite lets you focus on your data and getting work done. This is the...