FloCon provides a forum for exploring large-scale, next-generation data analytics in support of security operations. FloCon is geared toward operational analysts, tool developers, researchers, security professionals, and others interested in applying cutting-edge techniques to analyze and visualize large datasets for protection and defense of networked
The IcedID Trojan was spotted in September by researchers at IBM's X-Force Research team. They said the Trojan has several standout techniques and procedures, such as the ability to spread over a network and the ability to monitor a browser's activity by setting up a local proxy for traffic tunneling.
A longer continuing resolution in 2018 could add unneeded stress to a fledgling office trying to build cybersecurity into Air Force weapons systems.
The Information Systems Security Association (ISSA) and independent industry analyst firm Enterprise Strategy Group (ESG) revealed trending data finding that the cybersecurity skills shortage is worsening and becoming a rapidly widening business problem. The majority of survey respondents (70 percent) continue to believe that the cybersecurity skills
The Trump administration on Thursday sanctioned seven Iranian nationals and an Iran-based computer security company for their role in cyberattacks targeting the U.S. financial system. The treasury Department announced sanctions on 11 entities and individuals for supporting Iran's elite Islamic Revolutionary Guards Corps (IRGC) and networks responsible for
A Paris-based security researcher, who goes by the pseudonymous handle Benkow, discovered an open and accessible web server hosted in the Netherlands, which stores dozens of text files containing a huge batch of email addresses, passwords, and email servers used to send spam. Those credentials are crucial for the spammer's large-scale malware operation to
Some cybersecurity firms believe the hacking group exposed by ESET, known as Turla, is connected to Russian intelligence services. The backdoor used by Turla has been codenamed Gazer. ESET describes Gazer as a stealthy and complex hacking tool that is difficult to detect. The implant receives encrypted code from an external server, which can execute
"We find ourselves at a crucial point. We are in a pre-9/11 cyber moment," said Michael Wallace, a retired energy executive who co-chairs the NIAC cyber working group. "We have the opportunity to be proactive in this limited window before our nation experiences a watershed cyber attack, and we’re calling on the administration to take bold and decisive
The FBI's goal is to have U.S. firms push Kaspersky out of their systems as soon as possible or refrain from using them in new products or other efforts, the current and former officials say. The FBI's counterintelligence section has been giving briefings since beginning of the year on a priority basis, prioritizing companies in the energy sector and
Both parties will share expertise in protecting the automation environment based on the International Electrotechnical Commission (IEC) 62443 standard and appropriate security measures in the form of events, webinars, and educational material. Together, ISA and Siemens intend to raise awareness and share best practices for industrial security with