Top Stories

Drive-By Malware Uses Google Sites for Drive by Download Attacks

New malware, LoadPCBanker, is leveraging Google’s Sites to spread via drive-by download attacks, according to a new report. Companies are advised to block uploads and downloads from the service.

Spotlight Podcast: Fixing Supply Chain Hacks with Strong Device Identities

Supply chain hacks like ME Docs and ASUS aren’t inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group’s DICE Architectures Working Group* about how strong device identities for IoT endpoints can stop supply chain compromises.

Mysterious Trisis Malware Strikes Again

Researchers at the firm FireEye warn that TRITON, a type of malware that targets industrial control safety systems, has resurfaced at a facility in the Middle East.

Warning: Trump Terrorist Designation May Prompt Iranian Cyber Attacks

The Trump Administration’s designation of Iran’s Islamic Revolutionary Guard Corps as a foreign terrorist organization could prompt retaliatory cyber attacks from state-sponsored actors from the Islamic Republic, security researchers from Recorded Future warn.