An Indicator of Compromise is typically observed after an initial attack or compromise, whereas Indicators of attack (IOAs) are events that may reveal an active attack before IOCs become visible.
Cyber-criminals are exploiting traditional measures of trust to gain a foothold on users systems by compromising trusted sites via background initiated requests, using phishing sites, and typo-squatting.
An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
Cryptocurrency miners have begun using two older and already patched vulnerabilities to compromise servers to mine the Monero digital currency.
A POS malware infection was responsible for compromising payment card data collected at certain Forever 21 stores last year - an attack that was exacerbated by a lack of encryption on some devices, the retailer stated last week.
The Vietnamese government has reportedly deployed a military cyber-warfare unit compromised of more than 10,000 digital soldiers to combat and censor views on the internet that it finds threatening or "wrong."
Researcher uncovers method of hijacking the functionality of some AV tools in order to compromise endpoints. Trend Micro, Emisoft, Ikarus, Kaspersky, Check Point's ZoneAlarm and Malwarebytes have fixed their offerings.
Uber will now require drivers to take selfies to prevent fraud and protect their accounts from compromise.
Spotify may have experienced a security breach based on a list of customer account credentials discovered on Pastebin.
An attack campaign described as having plenty of potential has collected extensive information from the internet and compromised selected websites.
According to Symantec, a virus known as Wifatch has been used to treat more than 10,000 home routers against cyber-attacks.
A Swiss researcher is advocating turning off WPS to secure routers after finding a flaw that eliminates the randomness of codes generated by some routers when WPS is switched on...
High-tech exports from the US are routinely compromised by backdoors inserted by the NSA; UK intellegence agency oversight also criticised.
Systems administrators urged to take the 'tough medicine' and wipe all affected computers
From being drawn in by a honypot, through to being compromised, lessons from life can have parallels with what happens online suggests Calum MacLeod.
Microsoft has confessed that it has fallen victim to the same attack as both Facebook and Apple.
The website behind the attack on Facebook has been identified.