SecurityCentric is your source for Blog Aggregation in the Security industry

Attivo Networks Self-Learning Dynamic Security Debuts

 Mark As Read    

Attivo Camouflage employs its home-developed Dynamic Behavioral Deception to create lures and decoys that are identical to real assets.

Security - RSS Feeds 14 hours, 23 min ago

Zerodium Now Offering Record $1.5M iOS Bug Bounty Award

 Mark As Read    

NEWS ANALYSIS: Zerodium has upped its top reward for iOS bugs by $500,000, but not all bug bounties are the same.

Security - RSS Feeds 20 hours, 15 min ago

Search.yourinstantrecipes.com

 Mark As Read    

Search.yourinstantrecipes.com is known to be an untrustworthy search engine; however, users do not hurry to remove it because they do not know that this search tool might cause harm. Also, many people expect that they could find recipes they need quickly if they keep Search.yourinstantrecipes.com and use it as the default search engine. We cannot...

411 on Spyware 1 day ago

Securefindersearch.com

 Mark As Read    

Securefindersearch.com is a new search engine that may not be as secure as its name tries to suggest. In fact, we have labeled this infection as a browser hijacker because it can modify your home page, new tab page, and default search engine settings in your browsers. This hijacker seems to affect the three main

411 on Spyware 1 day ago

CryptoWall Ransomware Sees Dramatic Decrease in Infections

 Mark As Read    

While groups using CryptoWall 3 took in an estimated $325 million in revenue, those using CryptoWall 4 likely took in less than $18 million, a report finds.

Karamaba Raises $2.5M in Funding, Bolsters Autonomous Car Security

 Mark As Read    

Karamaba improves autonomous vehicle security by adding new in-memory attack prevention capabilities to its Carwall security platform.

Shape Security Raises $40M to Expand Its Marketing Reach

 Mark As Read    

Shape Security's latest founding round brings its total financing to date to $106 million.

Search.so-v.com

 Mark As Read    

Have you noticed an unauthorized change of your default search engine within your web browser? If so, there is a possibility that an application that goes by the name of Search.so-v.com induced that alteration. The devious program in question is an intrusive search engine, which should be avoided at all times even if you come

411 on Spyware 1 day ago

DXXD Ransomware

 Mark As Read    

Even though DXXD Ransomware is not as popular as other file-encrypting ransomware infections, it might still appear on your server one day if you are not careful. Yes, it seems that this infection targets servers exceptionally. As DXXD Ransomware is an infection that encrypts files, the first thing you will notice is that all the

411 on Spyware 1 day ago

CryptFile2 Ransomware

 Mark As Read    

The devious CryptFile2 Ransomware is primarily targeted at the US government and state departments linked to education and health, as well as telecommunication and insurance companies, but regular users are not safe either. In the past, this infection was spread with the help of exploit kits; however, in the recent times, this ransomware was mainly...

411 on Spyware 2 days ago

Help_you@india.com Ransomware

 Mark As Read    

Help_you@india.com Ransomware is a newly discovered ransomware-type infection designed to infect your computer via email spam and encrypt nearly all of the files on your computer. The cybercriminal behind it wants you to pay a ransom for the decryption key, but we suggest that you remove it instead because there is no guarantee that it

411 on Spyware 2 days ago

Google Makes OnHub Home Router More Secure

 Mark As Read    

By adding more security features, Google says its OnHub Home router is now more secure than the typical home router.

Voldemort Ransomware

 Mark As Read    

If you find that your screen is covered with an image of Voldemort from Harry Potter, there is a great chance that Voldemort Ransomware has invaded your operating system. Although this infection is not encrypting files at the time of research, the situation might have changed by the time you are reading this. Our researchers

411 on Spyware 3 days ago

Tabs000.online

 Mark As Read    

Tabs000.online looks like a legitimate search engine, but it is nothing of the sort. We have classified it as a browser hijacker and recommend that you remove it from your PC as soon as the opportunity arises. In short, it is distributed in a malicious way that is designed to inject it into your web

411 on Spyware 3 days ago

ODIN Ransomware

 Mark As Read    

ODIN Ransomware is a variant of Locky Ransomware. It does not differ much from other variants of Locky Ransomware, but it uses a new filename extension .ODIN instead of .ZEPTO or .LOCKY. This variant has been released recently by cyber criminals, but it is already rather prevalent, so you have to be careful. If you

411 on Spyware 3 days ago

Porting Project Provides Provides New Security Tool for Windows

 Mark As Read    

Facebook and security firm Trail of Bits port the open source osquery monitoring tool to Windows, giving enterprise IT shops an alternative to antivirus, logging and administration products.

Google Addresses Threats From Cross-Site Scripting Errors

 Mark As Read    

Google's CSP Evaluator tool can help developers make sure that policies they use for mitigating cross-site scripting errors are effective, the company said.

Splunk Upgrades Enterprise Security, User Behavior Analytics Platforms

 Mark As Read    

The new releases of the Splunk Enterprise Security and User Behavior Analytics platforms are designed to provide improved operational intelligence.

Aqua to Use $9M in Funding to Ramp Up Container Security Efforts

 Mark As Read    

Microsoft takes a leading investment role in the startup, which looks to capitalize on the emerging opportunity for container security.

Discoveranswer.com

 Mark As Read    

If you have discovered a program called Discoveranswer.com active on your personal computer, do not hesitate and execute its thorough removal. We recommend doing so due to the fact that the application in question is a suspicious search engine, which must not be tolerated. Keep in mind that overall functionality of this application is intolerable...

411 on Spyware 3 days ago

Threat Spotlight: GozNym

 Mark As Read    

This blog was authored by Ben Baker, Edmund Brumaghin, and Jonah Samost. Executive Summary GozNym is the combination of features from two previously identified families of malware, Gozi and Nymaim. Gozi was a widely distributed banking trojan with a known Domain Generation Algorithm (DGA) and also contained the ability to install a Master Boot Reco...

Security 3 days ago

MyTrustSearch.com

 Mark As Read    

Although the “Search” logo on MyTrustSearch.com reminds us of Google, and the search provider that every user is redirected from this page is Google Custom Search, you should not consider this suspicious search tool as harmless. In fact, our researchers classify it as a malicious browser hijacker that should be removed as soon as possible.

411 on Spyware 3 days ago

Topsocialhubsearch.com

 Mark As Read    

Topsocialhubsearch.com is a search engine that has been categorized as a browser hijacker because it tends to hijack homepages and New Tab pages on Mozilla Firefox, Google Chrome, and Internet Explorer. Users usually do not even know that Topsocialhubsearch.com is not a trustworthy tool and, as a result, they decide to let it stay set

411 on Spyware 3 days ago

Donald Trump Ransomware

 Mark As Read    

Someone has obviously made a bad joke with Donald Trump Ransomware because this malicious infection has nothing to do with the presidential hopeful. However, the malware developers were obviously hoping to get higher infection rates by using one of the most popular search keywords this season. Fear not, this program is not as dangerous as

411 on Spyware 4 days ago

Tavanero.info

 Mark As Read    

An application entitled Tavanero.info should be bypassed at all times since it is nothing more than yet another browser hijacker which must be terminated if it is ever found up and running on your personal computer. Such categorization has been made by our research team because of the devious features that this hijacker exhibits while

411 on Spyware 4 days ago

Clearance Suspended for Navy Sailor Who Refused to Stand During the National Anthem “ Another Social Media Frenzy Starts

 Mark As Read    

Those in the military forfeit many personal freedoms that the rest of the civilian population take for granted. Following rules, regulations, and the orders of those appointed over you are an essential part of military discipline and order. All enlistees takeAs  an oath of enlistment which states As "I, (name of enlistee), do solemnly swear (or [&#...

Project APT: How to Build an ICS Network and Have fun at the Same Time

 Mark As Read    

The Industrial Control System (ICS) security team at Talos frequently see requests from peers and from students on how to build an ICS test lab. After all, the best way to learn is to get some equipment and learn with good old-fashioned hands-on tinkering. Unfortunately, many frame their test lab inquiries based on more traditional […]

Security 4 days ago

Gogletab.com

 Mark As Read    

Is google.com set as your homepage? If it is, go ahead and check if Gogletab.com has not corrupted your web browser! This browser hijacker is very inconspicuous, and Google users might not notice its entrance at all. This devious infection even uses the Google logo, and it redirects all your search queries to the google.com

411 on Spyware 5 days ago

2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%

 Mark As Read    

Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data wh...

Security 5 days ago

Toptvtabsearch.com

 Mark As Read    

Toptvtabsearch.com is a malicious search engine distributed in a manner that is set to replace your browser’s homepage and new tab page addresses by force. Thus, we have classified it as a browser hijacker and advice that you remove it as soon as possible. Apart from hijacking your browser’s settings, it will also gather information

411 on Spyware 5 days ago

Profitmaximizer.co

 Mark As Read    

If you have been redirected to Profitmaximizer.co without any warning and authorization, it should be obvious for you that there is something strange going on. Unfortunately, because this website promises to help earn money, many users interact with it without thinking things through. It is completely dangerous to interact with the services provide...

411 on Spyware 5 days ago

DDoS Attacks Approach 1-Terabit Record

 Mark As Read    

NEWS ANALYSIS: Today a 665G-bps attack is considered an aberration, but there will likely come a day when it is not looked at that way.

Experiments Suggest Quantum Encryption Is Feasible

 Mark As Read    

NEWS ANALYSIS: Experiments have shown how the quantum entanglement of particles can be used for unhackable communications and encryption.

RAND Study of Data Breach Costs Suggests Smaller Average Losses

 Mark As Read    

A RAND study of insurance payouts suggests that data breach losses are considerably lower than reported in other studies.

New Mobile Malware Hits Google Play, Hundreds of Users Affected

 Mark As Read    

We've, recently, intercepted, a, currently, circulating, malicious, campaign, affecting, hundreds, of, Google, Play, users, potentially, exposing, their, devices, to, a, multi-tide, of, malicious, software, potentially, exposing, the, confidentiality, integrity, and, availability, of, their, devices. Largely, relying, on a, set, of, social, enginee...

Lenovo, Intel, Synaptics, PayPal Want to End Passwords on PCs

 Mark As Read    

The companies will bring FIDO-compliant fingerprint authentication to upcoming Lenovo laptops, starting with the Yogi 910 convertible PC.

Yahoo Unable to Confirm Recent Breach Claim but Finds Entirely New One

 Mark As Read    

NEWS ANALYSIS: Yahoo has found no evidence of a breach that was alleged by a hacker in the summer, but it did discover a 2014 attack by state-sponsored hackers.

The Rise of Mobile Malware - A Retrospective

 Mark As Read    

With, mobile, malware, continuing, to, proliferate, cybercriminals, continue, getting, successfully, positioned, to, take, advantage, of, hundreds, of, thousands, of, socially, engineering, users, on, their, way, to, earn, fraudulent, revenue, in, the, process, of, monetizing, access, to, their, devices, potentially, compromising, the, confidential...

New Mobile Malware Spotted in the Wild, Hundreds of Users Affected

 Mark As Read    

We've, recently, intercepted, a, currently, circulating, spam, campaign, affecting, hundreds, of, thousands, of, users, while, exposing, the, confidentiality, integrity, and, availability, of, their, devices, to, a, multi-tude, of, malicious, software. Largely, relying, on, a, set, of, social, engineering, vectors, the, campaign, tries, to, tric...

Dailybestsearch.com

 Mark As Read    

If you encountered Dailybestsearch.com, you should know that it is an unreliable search engine possibly distributed through malicious software installers. The application was also classified as a browser hijacker, because of its capability to modify specific browser settings. Besides, specialists advise against its usage as the program might advert...

411 on Spyware 8 days ago

Why Enterprises Need to Guard Themselves Against Shadow Data Threat

 Mark As Read    

Shadow data, not just shadow IT, creates an additional threat to an organization, particularly one adopting more cloud apps.

Cyber Splitter Vbs Ransomware

 Mark As Read    

Ransomware in a category of malware and the programs that belong to it are set to either lock a computer’s screen or encrypt its files. Cyber Splitter Vbs Ransomware belongs to the second subgroup, so it is designed to encrypt your files and you ought to remove it as soon as it enters your computer.

411 on Spyware 8 days ago

Topsocialtabsearch.com

 Mark As Read    

If you have noticed unauthorized changes within your web browser's default settings, it is likely that they were triggered by a browser hijacker. One application that is entitled Topsocialtabsearch.com is fully capable of doing that. It is critical to avoid this devious program at all costs as it only exhibits negative and intrusive features, which...

411 on Spyware 8 days ago

Qubiv

 Mark As Read    

Qubiv is an application that should allow users to play premium games on qubiv.com. In this sense, it is similar to other applications, e.g. Yayzap and Gameslava that promise to enable users to play various online games free of charge. All these programs can be put into the category of advertising-supported applications (adware) because they

411 on Spyware 8 days ago

Nefryhok.xyz

 Mark As Read    

Do you know why Nefryhok.xyz is classified as a browser hijacker? It is easiest to pin this classification to those search tools that modify browser settings without permission. Well, even if it has asked for you permission before replacing the default search provider on your Google Chrome browsers, you should classify this search tool as

411 on Spyware 8 days ago

Yahoo Hit by Data Breach Affecting Over 500M Accounts

 Mark As Read    

With the number of affected user accounts at more than 500 million, the Yahoo breach is now one of the largest ever confirmed.

DHS Is Creating an IoT Security Framework of Principles

 Mark As Read    

Robert Silvers of DHS urges the industry to develop long-term solutions while also taking actions to address short-term challenges.

Need2Find.net

 Mark As Read    

Need2Find.net is one more browser hijacker that should be removed immediately if it is discovered on your computer. It is important to note that in some cases users might be manipulated into downloading it. This is so because developers of this intrusive program could employ misleading marketing techniques stating that their piece of software could...

411 on Spyware 8 days ago

CryPy Ransomware

 Mark As Read    

There seems to be no end for ransomware infections, as we have now yet another “present” on our lap: CryPy Ransomware. This new program does not give you a breather as it slithers into your system and then encrypts your files without a single warning. You have opened the right page if you want to

411 on Spyware 9 days ago

CryptoCat Ransomware

 Mark As Read    

CryptoCat Ransomware is a new threat that can encrypt your most important personal files, which could easily mean losing them for good. Of course, the authors of this dangerous ransomware program claim that they will send you the private key that was generated for your computer if you transfer the demanded fee. Although it is

411 on Spyware 9 days ago
Security
Welcome!
SecurityCentric aggregates blogs for the Security industry.
Custom Feeds
Add any RSS feed to the information you read daily.
Blocked Feeds
Block feeds to remove blogs you’re not interested in.
Account Settings
Customize the site by adding or removing feeds.

About Us

SecurityCentric is your source for all your Security news.

Have a Suggestion for Us?
Know of a Security blog that we're missing? Let us know!

Share SecurityCentric.com