Infosec expert viewpoint: IoT security initiatives
Sharp rise in fileless attacks evading endpoint security
What motivates bug hunters?
SecurityWeek
EMOTET Trojan Variant Evades Malware Analysis Risky Business: Understand Your Assets and Align Security With the Business
GitHub Warns Developers When Using Vulnerable Libraries Terdot Banking Trojan Could Act as Cyber-Espionage Tool
Middle East 'MuddyWater' Attacks Difficult to Clear Up Windows 10 Detects Reflective DLL Loading: Microsoft
New Cyber Insurance Firm Unites Insurance With Cyber Intelligence WordPress Sites Exposed to Attacks by 'Formidable Forms' Flaws
Ransomware Targets SMBs via RDP Attacks
SecureList
APT Trends report Q3 2017 Threat Predictions for Connected Health in 2018
Kaspersky Security Bulletin: Threat Predictions for 2018 Threat Predictions for Cryptocurrencies in 2018
Threat Predictions for Automotive in 2018 Threat Predictions for Financial Services and Fraud in 2018
ITSecurityGuru
Data-Driven DDoS Defence Decision Making
Eu Regulation, Skills And Governance Now Challenge Uk’s Leadership Of
‘Fourth Industrial Revolution’
Flowmon to address security challenges in SCADA/IoT environment
NHS IT Managers Cite Prioritizing Cybersecurity as Essential to Improving
Patient Trust and Care
Security researchers in Vietnam have fooled Iphone X face ID security -
cybersecurity experts have their say
Should you fear the Reaper?
Vectra 2018 Cyber Security predictions
Securityaffairs
20 Million Google Home and Amazon Echo devices are affected by Millions of
AI-based voice-activated personal assistants, including Google Home and
Amazon Echo, are affected by the Blueborne flaws
Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google
Play detection once again
Terabytes of US military social media surveillance miserably left wide open
in AWS S3 buckets
Who is behind MuddyWater in Middle East? Likely a politically-motivated
City of Spring Hill in Tennessee still hasn't recovered from ransomware attack -
actor
A new EMOTET Trojan variant improves evasion techniques
BankInfoSecurity
ETCISO
How Information Sharing Helped Curtail WannaCry Harm cyber security: How to hack into one of the world's largest banks, thrice
Researcher: McAfee URL Security Service Gave Pass to Trojan Cyber-diplomacy key component of global discourse: IT Minister
5