- Security -

Last update 09.10.2017 13:17:23

Introduction  List  Kategorie  Subcategory 0  1  2  3  4  5  6



Date

Name

Category

Web

18.8.19

Google Has Started Removing FTP Support From Chrome Security

Bleepingcomputer

17.8.19

News Wrap: DejaBlue Bugs and Biometrics Data Breaches

Privacy  Security

Threatpost

17.8.19

Fake News and Influence: Information Warfare in the Digital Age

Security

Threatpost

16.8.19 Unique Kaspersky AV User ID Allowed 3rd-Party Web Tracking Security

Bleepingcomputer

16.8.19 Many Users Don't Change Unsafe Passwords After Being Warned: Google Security Securityweek
16.8.19

Biometric data of 1M leaked via an unsecured Suprema owned database

Privacy  Security

Securityaffairs
16.8.19

Millions of Unencrypted Fingerprint and Facial Biometrics Found on Unsecured Database

Privacy  Security

Securityweek

16.8.19

Threat actors are adapting and switching their operations strategically and technically

Security

Net-security

15.8.19 Owners of Fake Tech Company Plead Guilty to Fraud Charges Security Securityweek
15.8.19

Extending security to fourth parties your business needs, but doesn’t control

Security

Net-security

15.8.19

A compendium of container escapes

Security

Net-security

15.8.19

Organizations that scan applications in production have a reduced risk of being breached

Security

Net-security

14.8.19 Free MANRS Tool Helps Improve Routing Security Security Securityweek
14.8.19

Help Net Security report: SecBI’s automated threat detection, response and hunting

Security

Net-security

12.8.19

McAfee Strengthens Container Security Capabilities With NanoSec Acquisition

Security

Securityweek
12.8.19 Beware of Fake Microsoft Account Unusual Sign-in Activity Emails Security

Bleepingcomputer

12.8.19 Google Chrome Incognito Mode Can Still Be Detected by These Methods Security

Bleepingcomputer

12.8.19

Nmap Defcon Release: 7.80

Security Net-security
12.8.19

Moving away from spreadsheets: How to automate your third-party risk management process

Security Net-security
12.8.19

Pitfalls to avoid when improving your software development skills

Security Net-security
12.8.19

Kubernetes security matures: Inside the project’s first audit

Security Net-security
11.8.19

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Security

Threatpost

10.8.19

Microsoft 365 to Get Enhanced Suspicious Content Submission Security

Bleepingcomputer

9.8.19

Google Chrome Tests Feature That Gives Any Site a Dark Mode

Security

Bleepingcomputer

9.8.19

Google's Cloud IAP Now Generally Available for Cloud VM Clients

Security

Bleepingcomputer

9.8.19

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

Security

Bleepingcomputer

9.8.19

AT&T Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

9.8.19

Microsoft To Disable VBScript by Default on August 13th

Security

Bleepingcomputer

9.8.19

GM Cruise Releases Automated Firmware Security Analyzer to Open Source Security Securityweek

9.8.19

Six critical areas to focus on when integrating DevSecOps into an organization

Security

Net-security

8.8.19

AttackSurfaceMapper automates the reconnaissance process

Security

Net-security

8.8.19

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Security

Net-security
8.8.19 Microsoft Says It 'Listens' to Conversations Only With Permission Security

Securityweek

8.8.19 The Fundamentals of Developing Effective DevSecOps Security

Securityweek

7.8.19

Developer Bypasses Chrome's Anti-Incognito Detection

Security

Securityweek

7.8.19

Slack Unveils New Enterprise Security Tools

Security

Securityweek

6.8.19

Microsoft Invites Researchers to Hack Their Azure Security Lab Security

Bleepingcomputer

6.8.19

Microsoft Offers Up to $300,000 in New Azure Security Lab Security Securityweek

6.8.19

Embracing the cloud and meeting its security demands

Security

Net-security

6.8.19

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security

Net-security

6.8.19

Online skimming: An emerging threat that requires urgent awareness and attention

Security

Net-security

6.8.19

Only 32% of government organizations consider a cloud-first strategy

Security

Net-security

5.8.19

JIRA Misconfiguration Leaks Data of Fortune 500 Companies Security Securityweek

5.8.19

Connected Cars Could be a Threat to National Security, Group Claims Security Securityweek

5.8.19

There is widespread business confusion and ignorance about the upcoming CCPA regulation

Security

Net-security

5.8.19

Sextortion: Follow the Money - The Final Chapter

Security

SANS

5.8.19

Security orchestration and automation checklist: How to choose the right vendor

Security

Net-security

5.8.19

DNS security is no longer optional

Security

Net-security

5.8.19

FSI organizations are failing to assess their software for security vulnerabilities before release

Security

Net-security

5.8.19

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

Security

Net-security

5.8.19

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

Security

Net-security

5.8.19

Public cloud data continues to grow, headed toward $500 billion by 2023

Security

Net-security

5.8.19

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Security

Net-security

2.8.19

Microsoft Boosts Compromised Account Detection in Azure AD by 100%

Security

Bleepingcomputer

2.8.19

PowerShell Empire Framework Is No Longer Maintained

Security

Bleepingcomputer

2.8.19

Google Chrome Hides WWW and HTTPS:// in the Address Bar Again

Security

Bleepingcomputer

2.8.19

Google Releases Beta of Anomaly Detection for G Suite Customers

Security

Securityweek

2.8.19

Most interesting trends on cloud service and web usage

Security

Net-security

1.8.19

Enterprise Software May Transmit Data Without Your Knowledge

Security

Bleepingcomputer

1.8.19

Outlook Is Down, Users Are Experiencing Sign-in Failures

Security

Bleepingcomputer

1.8.19

Chrome 76 Released With Blocked Flash, Incognito Detection Fix

Security

Bleepingcomputer

1.8.19

Researchers Replace IP Camera Feed With Fake Footage Security Securityweek

1.8.19

Chrome 76 Dumps Default Adobe Flash Player Support

Security

Threatpost

1.8.19

Companies struggle with the slow, unpredictable nature of AI projects

Security

Net-security

31.7.19

Crooks Sell Credentials Using Combolists-as-a-Service Model Security

Bleepingcomputer

31.7.19

Slack Experiencing Large-Scale Outage Caused by Messaging Issue Security

Bleepingcomputer

31.7.19

Solving security problems: Security advice for those with limited resources

Security

Net-security

31.7.19

Microsoft Makes Azure Security Center for IoT Generally Available

IoT  Security

Securityweek

31.7.19

Orchestrating security policies across your hybrid cloud with intelligent data virtualization

Security

Net-security

31.7.19

53% of enterprises have no idea if their security tools are working

Security

Net-security

31.7.19

Assessing the efficiency of phishing filters employed by email service providers

Security

Net-security

30.7.19

Security a Top Concern as Containerization Gathers Pace

Security

Securityweek

30.7.19

Whitepaper: Building a Threat Intelligence Programme (UK)

Security

Net-security

30.7.19

How to secure your data as you go digital

Security

Net-security

30.7.19

How effective is your security operations center?

Security

Net-security

29.7.19

Recognizing ZLIB Compression

Security

SANS

29.7.19

Cloud adoption and security are not mutually exclusive

Security

Net-security

29.7.19

The dynamic of modern security challenges: Issues security leaders face today

Security

Net-security

29.7.19

The rise of biometrics and passwordless security

Security

Net-security

29.7.19

How to increase the efficiency of your risk and compliance management strategy

Security

Net-security

29.7.19

SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market

Security

Net-security

28.7.19

Microsoft-Owned GitHub Blocks Devs in US Sanctioned Countries

Security

Bleepingcomputer

28.7.19

A Python TCP proxy

Security

SANS

27.7.19

DVRIP Port 34567 - Uptick

Security

SANS

27.7.19

Microsoft's Office Online Becomes Office After Rebranding

Security

Bleepingcomputer

26.7.19

Tax Professionals Warned by IRS to Create Data Security Plans

Security

Bleepingcomputer

26.7.19

Damaging insider threats rise to new highs in the past year

Security

Net-security

26.7.19

The need for scalable OT security

Security

Net-security

26.7.19

Current methods for anonymizing data leave individuals at risk of being re-identified

Security

Net-security

26.7.19

100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

Security

Net-security

25.7.19

Netography Launches Open Beta of Distributed IPS Service Security Securityweek

25.7.19

How to improve the hiring and retaining of infosec professionals?

Security

Net-security

25.7.19

50% of organizations believe attackers can infiltrate their networks each time they try

Security

Net-security

25.7.19

Employees overestimate the efficacy of their workplace’s email security strategy

Security

Net-security

25.7.19

Most SMBs have not identified and documented cybersecurity threats

Security

Net-security

25.7.19

Networking, security and programming training are most in demand

Security

Net-security

24.7.19

Citrix Confirms Password-Spraying Heist of Reams of Internal IP

Security

Threatpost

24.7.19

Tackling the Collaboration Conundrum

Security

Threatpost

24.7.19

May People Be Considered as IOC?

Security

SANS

24.7.19

How AI can improve user experience and security for the finance industry

Security

Net-security

24.7.19

If you’re struggling with Windows 10 migration, updates will be an even bigger challenge

Security

Net-security

23.7.19

Report Finds New Deficiencies in IRS Data Security Security Controls Security Securityweek

23.7.19

Microsoft to Roll Out Office 365 Licensing Changes in August Security

Bleepingcomputer

23.7.19

Windows 10 SmartScreen Sends URLs and App Names to Microsoft Security

Bleepingcomputer

23.7.19

Verifying SSL/TLS configuration (part 1)

Security

SANS

23.7.19

Amazon Alexa, Google Home On Collision Course With Regulation

Security

Threatpost

23.7.19

Tricking attackers through the art of deception

Security

Net-security

23.7.19

Security or compliance? Stop choosing between them

Security

Net-security

23.7.19

Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

Security

Net-security

22.7.19

Google increases bounties for Chrome, Google Play bugs

Security

Net-security

22.7.19

IRS Improved Security But Taxpayer Data Is Still At Risk Security

Bleepingcomputer

22.7.19

Securing modern web apps: A case for framework-aware SAST

Security

Net-security

22.7.19

Upfront transparency of data use is key for greater consumer acceptance of AI devices

Security

Net-security

22.7.19

How understanding and trust in data informs business decisions

Security

Net-security

21.7.19

Re-evaluating Network Security - It is Increasingly More Complex

Security

SANS

20.7.19

Mozilla Firefox Tor Mode Likely to Start as a Browser Addon Security

Bleepingcomputer

19.7.19

Microsoft Launches Bug Bounty Program for Dynamics 365 Security

Securityweek

19.7.19

Google Increases Bug Bounty Program Rewards Security Securityweek

19.7.19

Over 8,500 Google Chrome Bug Reports, Larger Rewards in Store Security

Bleepingcomputer

19.7.19

Google Triples Some Bug Bounty Payouts Security

Threatpost

19.7.19

Slack resetting passwords for roughly 1% of its users Security Securityaffairs

19.7.19

NSS Labs test exposes weaknesses in NGFW products

Security

Net-security

19.7.19

New open source solution reduces the risks associated with cloud deployments

Security

Net-security

19.7.19

Business owners prioritize investment in technology over upskilling

Security

Net-security

18.7.19

Firefox to Warn When Saved Logins are Found in Data Breaches Security

Bleepingcomputer

18.7.19

Cracked Tesla 3 Windshield Leads to $10,000 Bug Bounty Security Bleepingcomputer

18.7.19

Scraping the TOR for rare contents Security Securityaffairs

18.7.19

The Other Side of Critical Control 1: 802.1x Wired Network Access Controls

Security

SANS

18.7.19

Anti-Debugging Techniques from a Complex Visual Basic Packer Security Securityaffairs

18.7.19

True passwordless authentication is still quite a while away

Security

Net-security

18.7.19

Skills gap remains a top barrier to SD-WAN adoption

Security

Net-security

18.7.19

Adoption rates of basic cloud security tools and practices still far too low

Security

Net-security

18.7.19

Certificate-related outages impact the reputation of financial services organizations

Security

Net-security

18.7.19

Federal and SLED IT managers say AI will be a game changer

Security

Net-security

18.7.19

Smarter Security’s new optical technology to prevent sidegating

Security

Net-security

18.7.19

Cohesity Runbook enables enterprises to systematically move workloads to the cloud

Security

Net-security

17.7.19

Anti-Debugging Techniques from a Complex Visual Basic Packer

Security

Securityaffairs

17.7.19

Over 80% of network teams play a role in security efforts

Security

Net-security

17.7.19

The importance of hardening firmware security

Security

Net-security

17.7.19

Enterprises catching up with the explosion of cloud use and shadow IT in the workplace

Security

Net-security

16.7.19

Enterprises Showing Increasing Backing of Zero Trust Authentication Security

Securityweek

16.7.19

Security Teams Often Struggle to Get Developers on Board: GitLab Study Security

Securityweek

16.7.19

Firefox About:Compat Feature Shows How it Fixes Per-Site Bugs Security

Bleepingcomputer

16.7.19

Tesla Awards Researcher $10,000 After Finding XSS Vulnerability Security  Vulnerebility

Securityweek

16.7.19

Avoiding a biometric dystopia

Security

Net-security

16.7.19

The importance of IT asset management within digital transformation processes

Security

Net-security

16.7.19

Yearly hidden costs of managing vendor risk? $3.8 million per healthcare provider

Security

Net-security

16.7.19

How can attackers abuse artificial intelligence?

Security

Net-security

16.7.19

The rise of digital platforms is empowering the military, but challenges remain

Security

Net-security

15.7.19

New Election Systems Use Vulnerable Software

Security

Securityweek

15.7.19

How well are healthcare organizations protecting patient information?

Security

Net-security

15.7.19

CVSS 3.1: Refined and updated for easier adoption by the security community

Security

Net-security

15.7.19

Only 25% of organizations using AI have an enterprise-wide AI strategy

Security

Net-security

12.7.19

Microsoft Edge Canary Now Lets You Block Autoplaying Media Security

Bleepingcomputer

12.7.19

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Security

Threatpost

12.7.19

Human Workers Can Listen to Google Assistant Recordings Security Securityweek

12.7.19

Mozilla Introduces Grizzly Browser Fuzzing Framework Security Securityweek

12.7.19

Mozilla Moves to Deny UAE Firm's Root Inclusion Request Security Securityweek

12.7.19

Google Home Silently Captures Recordings of Domestic Violence and More

Security

Threatpost

12.7.19

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Security

Threatpost

12.7.19

How businesses can become more nimble and secure by moving to the cloud

Security

Net-security

12.7.19

69% of organizations believe they can’t respond to critical threats without AI

Security

Net-security

11.7.19

Parents’ Guide for Safe YouTube and Internet Streaming for Kids Security Securityaffairs

11.7.19

Prioritizing security efforts is key to data security in the cloud

Security

Net-security

11.7.19

How consumers view the transparency of their AI-enabled interactions

Security

Net-security

10.7.19

Malwarebytes is Now Enforcing Lifetime Licenses to One PC Security Bleepingcomputer

10.7.19

Mozilla Blocks DarkMatter From Becoming a Trusted CA in Firefox Security Bleepingcomputer

10.7.19

Samba Project tells us "What's New" - SMBv1 Disabled by Default (finally)

Security

SANS

10.7.19

Dumping File Contents in Hex (in PowerShell)

Security

SANS

10.7.19

Discovering and fingerprinting BACnet devices

Security

Net-security

10.7.19

The pervasive use of second screens endangers corporate IT networks

Security

Net-security

10.7.19

Do cloud apps make you a target for cyber attacks?

Security

Net-security

10.7.19

Scientists developing self-organizing migration of services with sovereignty over proprietary data

Security

Net-security

10.7.19

Worldwide spending on public cloud services to double by 2023

Security

Net-security

9.7.19

Mozilla Firefox 68 Released With Security and Extension Enhancements Security Bleepingcomputer

9.7.19

Solving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS

Security

SANS

9.7.19

Whitepaper: Know your enemy, know your risk

Security

Net-security

9.7.19

Rules-Based Policy Approaches Need to Go

Security

Threatpost

9.7.19

What can financial institutions do to improve email security?

Security

Net-security

9.7.19

Most SMB devices run Windows versions that are expired or will expire by January 2020

Security

Net-security

9.7.19

Are humans ready for AI to take control of digital security?

Security

Net-security

8.7.19

Mozilla Firefox Protection Report to Show Blocked Tracker Stats

Security

Bleepingcomputer

8.7.19

Why identity is the foundation of security

Security

Net-security

8.7.19

Experts weigh in on salient issues around emerging threats and security tech

Security

Net-security

8.7.19

Most organizations plan to adopt new authentication solutions within two years

Security

Net-security

8.7.19

How companies innovate as they face industry disruption

Security

Net-security

6.7.19

Samsung Update App with 10M+ Installs Charges for Free Firmware Security

Bleepingcomputer

6.7.19

Google Chrome to Unload Heavy Ads With Intensive Resource Usage Security

Bleepingcomputer

4.7.19 D-Link Settles FTC Lawsuit, Promises to Enhance Device Security Security Bleepingcomputer
4.7.19 Google AdSense Warns That Chrome to Block Abusive Ads on July 9 Security Bleepingcomputer
4.7.19 Certificates Issued to Huawei Subsidiary Found in Cisco Switches Security Securityweek
4.7.19 Georgia Failed to Subpoena Image of Wiped Elections Server Security

Securityweek

3.7.19

FTC, D-Link Reach Agreement Over Device Security Security Securityweek

3.7.19

Firefox finally addressed the Antivirus software TLS Errors Security Securityaffairs

3.7.19

Americans Want to Protect Their Information, but Don't Know How: Survey Security Securityweek

3.7.19

Trust dimensions in zero trust security

Security

Net-security

3.7.19

Migrations represent the number one challenge for database professionals

Security

Net-security

3.7.19

To benefit from DevOps implementation, security and dev teams must communicate better

Security

Net-security

3.7.19

Disaster recovery readiness is essential for hybrid and multi-cloud strategies

Security

Net-security

2.7.19

Firefox to Automatically Trust OS-Installed CA Certificates to Prevent TLS Errors Security

Thehackernews

2.7.19 How we hacked our colleague’s smart home Security Securelist

2.7.19

Firefox Update to Address Antivirus TLS Errors Security Securityweek

2.7.19

Finding Beauty In The Architecture

Security

Threatpost

2.7.19

Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

Security

Net-security

2.7.19

To remain competitive, businesses need strategic digital transformation

Security

Net-security

1.7.19

City Council of Somerville bans facial recognition technology

Security

Securityaffairs

1.7.19

Is Your Browser Secure? Here’s How to Secure Your Web Browser Against Attacks!

Security

Securityaffairs

1.7.19

Singapore Government Announces Third Bug Bounty Program

Security

Securityweek

1.7.19

Massachusetts City Bans Facial Recognition Technology

Security

Securityweek

1.7.19

How the healthcare industry can improve online trust

Security

Net-security

1.7.19

Bringing more talented individuals into the security industry

Security

Net-security

1.7.19

What is and what is not working for security operations teams in securing cloud data

Security

Net-security

30.6.19 Slack Is Experiencing Worldwide Outage, Degraded Performance Security

Bleepingcomputer

29.6.19

Track This Demonstrates How Advertisers Track You On The Web

Security

Bleepingcomputer

29.6.19

Google Chrome OS 75 Released with ZombieLoad MDS Mitigations

Security

Bleepingcomputer

28.6.19

Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files

Security

Securityweek

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

Death of the VPN: Enterprise Security Needs New Foundations

Security

Threatpost

28.6.19

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security

Securityaffairs

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

The biggest SecOps burdens hindering progress for enterprises and MSSPs

Security

Net-security

28.6.19

Interoperability and security remain critical factors in any smart city deployment

Security

Net-security

27.6.19

Google Makes DNS Over HTTPS Generally Available Security Securityweek

27.6.19

Google Announces DNS over HTTPS ‘General Availability’

Security

Threatpost

27.6.19

Google Allows G Suite Users to Log In With Security Codes Security Securityweek

27.6.19

The Other Side of CIS Critical Control 2 - Inventorying *Unwanted* Software

Security

SANS

27.6.19

Threat actors are doing their homework, researchers identify new impersonation techniques

Security

Net-security

27.6.19

Organizations need greater visibility into network activity

Security

Net-security

27.6.19

Finding skilled pros remains a challenge, cloud and security in high demand

Security

Net-security

26.6.19

AWS Launches Mirroring Feature for Inspecting Network Traffic

Security

Securityweek

26.6.19

Microsoft Adds 2FA-Protected "Personal Vault" Within OneDrive Cloud Storage

Security

Thehackernews

26.6.19

Microsoft OneDrive users get an even more secure Personal Vault

Security

Net-security

26.6.19

Google delivers new G Suite security tools

Security

Net-security

26.6.19

Business Decision Makers Focus on the Wrong Security Issues Security

Bleepingcomputer

26.6.19

Firefox to Use Windows BITS Service for Background Updates Security

Bleepingcomputer

26.6.19

BGP Route Leak Causes Cloudflare and Amazon AWS Problems Security Bleepingcomputer

26.6.19

AWS Announces General Availability of Security Hub

Security

Securityweek

26.6.19

Review: Specops uReset

Security

Net-security

26.6.19

Cloud security exacerbated by immature security practices

Security

Net-security

26.6.19

Every year, millions of web domains are registered to defraud businesses

Security

Net-security

25.6.19

The Modern-Day Heist: IP Theft Techniques That Enable Attackers

Security

Threatpost

25.6.19

Why businesses need IAM to push their zero trust frameworks forward

Security

Net-security

25.6.19

Emergency Presidential Alerts can be spoofed, researchers warn

Security

Net-security

25.6.19

You don’t just acquire a company, but also its cybersecurity posture

Security

Net-security

25.6.19

How much risk small businesses really pose to supply chain cybersecurity?

Security

Net-security

25.6.19

Most widely adopted digital solutions? Big data, cloud and CRM

Security

Net-security

24.6.19

WeTransfer incident: file transfer emails were sent to unintended email addresses

Security

Securityaffairs

24.6.19

WeTransfer Security Incident: File Transfer Emails Sent to Wrong People Security Securityweek

24.6.19

Beating biometrics: Why biometric authentication alone is not a panacea

Security

Net-security

24.6.19

Which SD-WAN products offer a notable return on investment?

Security

Net-security

24.6.19

Why poor visibility is hampering cybersecurity

Security

Net-security

24.6.19

Only 12% of banks appear to be fully committed to digital transformation

Security

Net-security

23.6.19

Windows Terminal Is Here in It's Multi-Tabbed Console Glory Security

Bleepingcomputer

23.6.19

WeTransfer Security Incident Sent Files to the Wrong People Security

Bleepingcomputer

20.6.19

Not-so-dear subscribers

Security

Securelist

20.6.19

Are Artificial Intelligence and Machine Learning Just a Temporary Advantage to Defenders?

Security

Securityweek

20.6.19

Open Source Clones Unofficially Sold on the Microsoft Store

Security

Bleepingcomputer

20.6.19

Google Adds Deceptive URL Alerts To Chrome, Unsafe URL Report Add-on

Security

Bleepingcomputer

20.6.19

Microsoft Azure Bastion Preview: Remote VM Access via Azure Portal

Security

Bleepingcomputer

20.6.19

Docker Desktop for Windows 10 Will Soon Switch to WSL 2

Security

Bleepingcomputer

20.6.19

Accidental Cat Filter Makes Politician's Live Stream Hilarious

Security

Bleepingcomputer

20.6.19

How To Secure Your Network: Five Modern Alternatives to VPN

Security

Bleepingcomputer

20.6.19

How to add security to digital transformation processes

Security

Net-security

20.6.19

How can organizations leverage AI technologies to achieve project success?

Security

Net-security

19.6.19

Google Boosts Chrome Protection Against Deceptive Sites

Security

Securityweek

19.6.19

Accenture Acquires Research and Consulting Firm Deja vu Security Security

Securityweek

19.6.19

Cloudflare Joins the League of Entropy Security Securityweek

19.6.19

What You Need To Know About TCP "SACK Panic"

Security

SANS

19.6.19

Google launches Chrome extension for reporting suspicious sites

Security

Net-security

19.6.19

Free Cloudflare Tool Helps CAs Securely Issue Certificates

Security

Securityweek

19.6.19

Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Security

Net-security

19.6.19

Insecure password memory aids: A passwordless future could be the solution

Security

Net-security

19.6.19

Organizations more likely to accelerate business when protecting their cloud data

Security

Net-security

18.6.19 Researcher Scrapes and Posts 7 Million Venmo Transactions Security Securityweek
18.6.19

Economic cycles and disruption are where top CFOs set their firms apart from the competition

Security

Net-security

17.6.19

Google Chrome Canary Flag Makes The Browser a Colorful Mess

Security

Bleepingcomputer

17.6.19

Bella Thorne published her private nude photos before a hacker that was threatening her

Security

Securityaffairs

17.6.19

What does runtime container security really mean?

Security

Net-security

17.6.19

Are U.S. companies overpaying to attract new talent?

Security

Net-security

17.6.19

Appliance upgrades and excessive network latency delaying Office 365 deployments

Security

Net-security

15.6.19 New API Changes How Ad Blockers Work in Chrome Security

Securityweek

15.6.19

Xenotime threat actor now is targeting Electric Utilities in US and APAC Security Securityaffairs

14.6.19

A few Ghidra tips for IDA users, part 4 - function call graphs

Security

SANS

14.6.19

Organizations need capabilities and practices to generate value from AI

Security

Net-security

13.6.19

VIP WordPress Sites Currently Experiencing Availability Issues

Security

Bleepingcomputer

13.6.19

Microsoft Blocks Some Bluetooth Devices Due to Security Risks

Security

Bleepingcomputer

13.6.19

Mozilla Makes Firefox its Own Brand Name, Releases New Logos

Security

Bleepingcomputer

13.6.19

New FormBook Dropper Harbors Obfuscation, Persistence

Security

Threatpost

13.6.19

Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Security

Securityweek

13.6.19

What is "THAT" Address Doing on my Network

Security

SANS

13.6.19

CISO do’s and don’ts for board reporting

Security

Net-security

13.6.19

Healthcare executives need to make cybersecurity a business priority

Security

Net-security

13.6.19

Code signing keys and certificates are crucial security assets, are you protecting them?

Security

Net-security

13.6.19

Personal security and national security concerns are back on the rise

Security

Net-security

13.6.19

Whitepaper: Maturing a Threat Intelligence Program

Security

Net-security

12.6.19

What kids get up to online Security

Securelist

12.6.19

The Cynet Free Visibility experience: Unmatched insight into IT assets and activities

Security

Net-security

12.6.19

Will self-driving cars represent a new mode for surveillance?

Security

Net-security

11.6.19

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million

Security

Securityweek

11.6.19

Mozilla Confirms Premium Firefox Browser With Security Features

Security

Threatpost

11.6.19

WordPress Sites Worldwide Hit with ‘Call-Girl’ Search-Engine Pollution

Security

Threatpost

11.6.19

Europe’s online economy risks losing €57 billion as SCA is enforced

Security

Net-security

11.6.19

Hackproofing smart meters and boosting smart grid security

Security

Net-security

11.6.19

Analytics and automation solutions to help contact center IT staff ensure compliance

Security

Net-security

11.6.19

Lack of visibility and IT staff availability: The main challenges of enterprise decentralization

Security

Net-security

10.6.19

The Dark Net, a Major Threat but Also a Resource

Security

Securityweek

10.6.19

Sysmon Getting DNS Query Logging with Querying Process Name

Security

Bleepingcomputer

10.6.19

VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program

Security

Bleepingcomputer

10.6.19

Google Chrome 75 Has a Working Tab Hover Card Feature

Security

Bleepingcomputer

10.6.19

Nine Major VPNs Could Get Blocked by Russia in 30 Days

Security

Bleepingcomputer

10.6.19

Critical RCE affects older Diebold Nixdorf ATMs

Security

Securityaffairs

10.6.19

Tip: Sysmon Will Log DNS Queries

Security

SANS

10.6.19

Most e-commerce websites running Magento at high risk of cybercrime

Security

Net-security

10.6.19

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Security

Net-security

9.6.19

Internet Explorer Mode Now Works in Microsoft Edge Dev Builds

Security

Bleepingcomputer

9.6.19

Google Chrome is Getting Closer to Working Tab Groups

Security

Bleepingcomputer

8.6.19

News Wrap: Infosecurity Europe Highlights and BlueKeep Anxiety

Security

Threatpost

8.6.19

Troy Hunt: ‘Messy’ Password Problem Isn’t Getting Better

Security

Threatpost

7.6.19

Chrome 75 Released with 42 Security Fixes and New Features Security

Bleepingcomputer

7.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

Security

Threatpost

7.6.19

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security

Securityaffairs

7.6.19

Poor data management can cost organizations $20 million each year

Security

Net-security

7.6.19

Workforce diversity key to plugging the IT skills gap

Security

Net-security

6.6.19

Why Election Trust is Dwindling in a Post-Cambridge Analytica World

Security

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Security

Threatpost

6.6.19

Infosecurity Europe: Easing the Clash Between IT and OT

Security

Threatpost

6.6.19

Getting (proper) value out of security assessments

Security

SANS

6.6.19

Trust nothing: A life in infosec is a life of suspicion

Security

Net-security

6.6.19

An intelligence-driven approach to cyber threats

Security

Net-security

6.6.19

How privileged insiders threaten the security of global organizations

Security

Net-security

6.6.19

Will biometrics replace passwords for online payment authentication?

Security

Net-security

6.6.19

How much do you know about your invisible workforce?

Security

Net-security

5.6.19

Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default

Security

Thehackernews

5.6.19

Embrace chaos to improve cloud infrastructure resilience

Security

Net-security

5.6.19

Unclassified data creates security blind spots for most companies

Security

Net-security

4.6.19

AI Isn’t Good Enough When Lives Are on the Line, Experts Warn

Security

Threatpost

4.6.19

Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders

Security

Net-security

3.6.19

Google is taking action on deceptive installation tactics for Chrome Browser Extensions

Security

Securityaffairs

3.6.19

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security

Securityaffairs

3.6.19

How likely are weaponized cars?

Security

Net-security

3.6.19

Why zero trust is crucial to compliance

Security

Net-security

3.6.19

Cloud migration journey is more complex than anticipated for innovation and efficiency

Security

Net-security

1.6.19

Google Targeting Deceptive Install Tactics for Chrome Extensions

Security

Bleepingcomputer

1.6.19

Gmail's Confidential Mode for G Suite Goes Live on June 25

Security

Bleepingcomputer

1.6.19

Google to Allow webRequest Ad Blocking for Enterprise Deployments

Security

Bleepingcomputer

1.6.19

Microsoft Boosts Shadow IT Discovery for Cloud Security

Security

Bleepingcomputer

1.6.19

Chrome Extensions Policy Hits Deceptive Installation Tactics

Security

Securityweek

1.6.19

Public Exposure of Sensitive Files on the Internet is Getting Worse

Security

Securityweek

31.5.19

Gen Z Interns and Social Media: A Perfect Security Storm

Security

Threatpost

31.5.19

Retrieving Second Stage Payload with Ncat

Security

SANS

31.5.19

Amazon Digital Assistant Alexa Gets New Skill: Amnesia

Security

Securityweek

30.5.19

G Suite to get Gmail confidential mode, on by default

Security

Net-security

30.5.19

Using Public Wi-Fi? Your data can be hacked easily! Here’s How…

Security

Securityaffairs

30.5.19

Majority of CISOs plan to ask for an increase in cybersecurity investment

Security

Net-security

30.5.19

Security overconfidence and immaturity continue to endanger organizations

Security

Net-security

30.5.19

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Security

Net-security

29.5.19

Structural integrity: Quantifying risk with security measurement

Security

Net-security

29.5.19

SD-WAN alone cannot address the networking challenges of digital business

Security

Net-security

28.5.19

GitHub introduces Dependabot-powered automated security fixes

Security

Net-security

28.5.19

nmap Service Fingerprint

Security

SANS

28.5.19

Handle personal data: What we forget is as important as what we remember

Security

Net-security

28.5.19

How to diminish the great threat of legacy apps

Security

Net-security

28.5.19

Volume and quality of training data are the largest barriers to applying machine learning

Security

Net-security

27.5.19

Sectigo says that most of certificates reported by Chronicle analysis were already revoked

Security

Securityaffairs

27.5.19

Video: nmap Service Detection Customization

Security

SANS

26.5.19

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Security

Bleepingcomputer

26.5.19

Firefox 67 Switching to Empty Profiles Causing Data Loss Fears

Security

Bleepingcomputer

26.5.19

Microsoft Pulls Edge Dev Update After Browser Launch Issues

Security

Bleepingcomputer

26.5.19

Google Tracks Purchases For Paying G Suite Users, Doesn’t Show It

Security

Bleepingcomputer

26.5.19

You're Not At Fault, Google Search Tripped and Broke Its Index

Security

Bleepingcomputer

25.5.19

GitHub introduces new tools and security features to secure code

Security

Securityaffairs

25.5.19

GitHub Adds New Tools to Help Developers Secure Code

Security

Securityweek

25.5.19

Goodbye Passwords: Hello Identity Management

Security

Threatpost

24.5.19

Amazon Shareholders Support Selling Face Recognition Tech to Police

Security

Securityweek

24.5.19

Investigating an Odd DNS Query

Security

SANS

24.5.19

Solving the network visibility problem with NaaS

Security

Net-security

24.5.19

Most security pros have considered quitting due to a lack of resources

Security

Net-security

24.5.19

Companies increasingly investing in container adoption, security remains an issue

Security

Net-security

24.5.19

How small businesses can keep their data secure

Security

Net-security

22.5.19

Google has been storing unhashed G Suite customer passwords

Security

Net-security

22.5.19

Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005

Security

Securityweek

22.5.19

Poor Security Hygiene Found Across Almost All Political Parties in US, Europe

Security

Securityweek

22.5.19

Awareness Training Firm KnowBe4 Acquires Awareness Measurement Firm CLTRe

Security

Securityweek

22.5.19

Google Stored Unhashed G Suite Passwords for Over a Decade

Security

Bleepingcomputer

22.5.19

Microsoft Releases Windows 10 Version 1903 - May 2019 Update

Security

Bleepingcomputer

22.5.19

Core Elastic Stack Security Features Now Available For Free Users As Well Security Thehackernews

22.5.19

The security challenges of managing complex cloud environments

Security

Net-security

22.5.19

Organizations face operational deficiencies as they deal with hybrid IT complexities

Security

Net-security

21.5.19

Defiant Tech firm who operated LeakedSource pleads guilty

Security

Securityaffairs

21.5.19

Salesforce Woes Linger as Admins Clean Up After Service Outage

Security

Threatpost

21.5.19

Using Shodan Monitoring

Security

SANS

21.5.19

Five ways automating IAM saves you money

Security

Net-security

21.5.19

How effective are login challenges at preventing Google account takeovers?

Security

Net-security

21.5.19

Traditional approach to data security hindering digital transformation initiatives

Security

Net-security

21.5.19

SD-WAN adoption growing as enterprises embrace app-centric architecture transition

Security

Net-security

21.5.19

Engineering teams are struggling because they’re missing the right automation

Security

Net-security

21.5.19

ThreatQ adds support for mobile and PRE-ATT&CK in response to rapid customer adoption

Security

Net-security

20.5.19

Group Seeks Investigation of Deep Packet Inspection Use by ISPs

Security

Securityweek

20.5.19

Salesforce faced one of its biggest service disruption of ever

Security

Securityaffairs

20.5.19

On the path to Zero Trust security: Time to get started

Security

Net-security

16.5.19

Over 757K Fraudulently Obtained IPv4 Addresses Revoked by ARIN

Security

Bleepingcomputer

16.5.19

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Security

Securityaffairs

16.5.19

Identity theft victims could lead us to accept more security-improving friction

Security

Net-security

16.5.19

CISOs: What would you do over?

Security

Net-security

16.5.19

When all else fails, organizations realize they must share threat intel

Security

Net-security

15.5.19

What does it take to be an infosec product strategist?

Security

Net-security

15.5.19

Cynet: An Autonomous Security Platform for Any Size Organization

Security

Threatpost

15.5.19

Security spring cleaning: 5 tips for tidying up network safeguards

Security

Net-security

15.5.19

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Security

Net-security

15.5.19

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Security

Net-security

15.5.19

Employees are aware of USB drive security risks, but don’t follow best practices

Security

Net-security

14.5.19

Linksys Smart Wi-Fi Routers Leak Info of Connected Devices

Security

Bleepingcomputer

14.5.19

GAO Makes Recommendations to Improve Security of Taxpayer Data

Security

Securityweek

14.5.19

Prioritizing risks in a climate of geopolitical threats

Security

Net-security

13.5.19

Blocking Hyperlink Auditing Tracking Pings with Extensions

Security

Bleepingcomputer

13.5.19

What CISOs should focus on when deciding on a strategy

Security

Net-security

13.5.19

Despite warnings, most people still don’t change their passwords

Security

Net-security

13.5.19

As IT companies approach digital transformation, key issues remain a struggle

Security

Net-security

10.5.19

Symantec CEO Quits Unexpectedly, Stock Sinks After Missing Estimates

Security

Securityweek

10.5.19

Mozilla to Delete Usage Data Collected From Firefox Addon Fix

Security

Bleepingcomputer

10.5.19

Firefox May Add Some Tor Features for Super Private Browsing Mode

Security

Bleepingcomputer

10.5.19

Orange signs an agreement for the acquisition of 100% of SecureLink

Security

Net-security

9.5.19

IT Specialist Convicted on Cyber Hacking Charges Sentenced

Security

Securityweek

9.5.19

Microsoft Edge Beta Downloads Leaked, Based on Chromium 75

Security

Bleepingcomputer

9.5.19

Microsoft Announces Enhanced Enterprise BitLocker Management

Security

Bleepingcomputer

9.5.19

Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera

Security

Threatpost

9.5.19

WordPress 5.2 Brings New Security Features

Security

Securityweek

9.5.19

Securing satellites: The new space race

Security

Net-security

9.5.19

Whose (usage) data is it, anyway?

Security

Net-security

9.5.19

How institutions, advisors, and investors think about digital assets

Security

Net-security

8.5.19

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

Security

Thehackernews

8.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Security

Threatpost

8.5.19

Top 5 Configuration Mistakes That Create Field Days for Hackers

Security

Threatpost

8.5.19

WordPress updates are digitally signed at last!

Security

Net-security

8.5.19

Researcher Finds CSS-Only Method to Track Mouse Movements

Security

Bleepingcomputer

8.5.19

Google Chrome To Stop Sites From Messing with the Back Button

Security

Bleepingcomputer

8.5.19

Tor Browser 8.0.9 Released to Fix Disabled NoScript Addon

Security

Bleepingcomputer

8.5.19

Microsoft Launches New Solutions to Protect Elections From Hacking

Security

Securityweek

8.5.19

Email roulette, May 2019

Security

SANS

8.5.19

Executing a multi-cloud strategy: Crawl, walk, run

Security

Net-security

8.5.19

Open banking establishes new access to banks’ networks, creating additional security issues

Security

Net-security

8.5.19

Senior payment executives’ thoughts on SME PCI compliance and security

Security

Net-security

7.5.19

ATMitch: New Evidence Spotted In The Wild

Security

Securityaffairs

7.5.19

Privileged Access Management Solutions Are Shifting to the Cloud: Survey

Security

Securityweek

7.5.19

Amazon to Disable S3 Path-Style Access Used to Bypass Censorship

Security

Bleepingcomputer

7.5.19

Microsoft Launches Multi-Shell Windows Terminal Console App

Security

Bleepingcomputer

7.5.19

Upcoming Microsoft Edge Features Announced at Build 2019

Security

Bleepingcomputer

7.5.19

Google Announces Fourth-Annual Capture the Flag Event

Security

Securityweek

7.5.19

Tor Security Add-On Abruptly Killed by Mozilla Bug

Security

Threatpost

7.5.19

Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting

Security

Threatpost

7.5.19

Text and Text

Security

SANS

7.5.19

Unhackable? New chip makes the computer an unsolvable puzzle

Security

Net-security

6.5.19

Firefox 66.0.4 Released With Fix for Disabled Addons

Security

Bleepingcomputer

6.5.19

NoScript temporarily disabled in Tor Browser … how to fix it?

Security

Securityaffairs

6.5.19

PSD2 and strong customer authentication: Are all elements equal?

Security

Net-security

5.5.19

Mozilla plans to ban Firefox Extensions containing obfuscated code

Security

Securityaffairs

4.5.19

Firefox Addons Being Disabled Due to an Expired Certificate

Security

Bleepingcomputer

4.5.19

Mozilla Bans Firefox Extensions Containing Obfuscated Code

Security

Securityweek

3.5.19

Chrome Will Allow Sites to Check Your OS Dark Mode Settings

Security

Bleepingcomputer

3.5.19

Mozilla To Disable Firefox Add-Ons with Obfuscated Code

Security

Bleepingcomputer

3.5.19

Mozilla will block Firefox add-ons that contain obfuscated code

Security

Net-security

3.5.19

Ladders, SkyMed Leak Employment, Medical Data for Millions

Security

Threatpost

3.5.19

Consumers care deeply about their privacy, security, and how their personal information is handled

Security

Net-security

2.5.19

Windows 10 Security Feature Slows Launching of Large Programs

Security

Bleepingcomputer

2.5.19

Open source security: The risk issue is unpatched software, not open source use

Security

Net-security

2.5.19

Only 55% of companies plan to be ready for CCPA implementation

Security

Net-security

2.5.19

Consumers increasingly deploying biometrics as PINs and passwords continue to fail

Security

Net-security

1.5.19

Microsoft Expands Security and Compliance Features for 365 Customers

Security

Securityweek

1.5.19

Local Credit Union Sues Fiserv Over 'Amateurish Security Lapses'

Security

Securityweek

1.5.19

Introduction to KAPE

Security

SANS

1.5.19

As organizations continue to adopt multicloud strategies, security remains an issue

Security

Net-security

1.5.19

Security and compliance obstacles among the top challenges for cloud native adoption

Security

Net-security

30.4.19

Windows Security Update Caused Recent Antivirus Conflicts and Freezes

Security

Bleepingcomputer

30.4.19

Making the most of threat intelligence with threat intelligence gateways

Security

Net-security

29.4.19

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Security

Securityaffairs

29.4.19

GE trade secret theft case demonstrates need for document behavior monitoring

Security

Net-security

27.4.19

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Security

Threatpost

27.4.19

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Security

Threatpost

27.4.19

Microsoft Removes Password-Expiration Policy in Windows 10

Security

Securityweek

26.4.19

NIST Tool Finds Errors in Complex Safety-Critical Software

Security

Securityweek

26.4.19

The strengths and weaknesses of different VPN protocols

Security

Securityaffairs

26.4.19

Service Accounts Redux - Collecting Service Accounts with PowerShell

Security

SANS

26.4.19

Best practices when implementing SD-WAN

Security

Net-security

26.4.19

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Security

Net-security

26.4.19

Global spending on digital transformation to reach $1.18 trillion in 2019

Security

Net-security

26.4.19

Established companies leveraging fintech capabilities for growth

Security

Net-security

25.4.19

Facial Recognition is Here: But Are We Ready?

Security

Threatpost

25.4.19

Poll: Are You Creeped Out by Facial Recognition?

Security

Threatpost

25.4.19

You can’t fix what you can’t see: A new way of looking at network performance

Security

Net-security

25.4.19

Researchers develop new tool for safety-critical software testing

Security

Net-security

25.4.19

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

Security

Net-security

24.4.19

Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators

Security

SANS

24.4.19

A casual approach to workplace communications presents major security risks

Security

Net-security

23.4.19

Whitepaper: Third-Party Risk to the Nth Degree

Security

Net-security

23.4.19

Windows April Updates Also Have Problems with McAfee Software

Security

Bleepingcomputer

23.4.19

Microsoft Windows Defender ATP APIs Now Generally Available

Security

Bleepingcomputer

23.4.19

Windows 7 Now Showing End of Support Warnings

Security

Bleepingcomputer

23.4.19

The foundation: Quantifying risk with focused security measurement

Security

Net-security

23.4.19

Scientists may have identified a new way to improve network security

Security

Net-security

20.4.19

Avast, Avira, Sophos and other antivirus solutions show problems after

Security

Securityaffairs

20.4.19

Mozilla Firefox to Enable Hyperlink Ping Tracking By Default

Security

Bleepingcomputer

20.4.19

The New Microsoft Edge Sometimes Impersonates Other Browsers

Security

Bleepingcomputer

20.4.19

Google to Block Logins from Embedded Browser Frameworks

Security

Bleepingcomputer

20.4.19

Windows 10 Application Guard Added to the New Microsoft Edge

Security

Bleepingcomputer

19.4.19

UK Announces Introduction of Online Pornography Age Checks in July

Security

Bleepingcomputer

19.4.19

Mysterious Operative Haunted Kaspersky Critics

Security

Securityweek

19.4.19

Fortinet Settles Whistleblower Case for $545,000

Security

Securityweek

19.4.19

DevSecOps: Fast development without sacrificing safety

Security

Net-security

19.4.19

Google will check apps by new developers more thoroughly

Security

Net-security

19.4.19

Building a modern data registry: Go beyond data classification

Security

Net-security

19.4.19

The biggest hurdles to digital transformation initiatives? Budget and top-down support

Security

Net-security

18.4.19

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

Security

Net-security

18.4.19

One hundred percent of endpoint security tools eventually fail

Security

Net-security

18.4.19

The perimeter is vanishing, how will you secure your network?

Security

Net-security

18.4.19

Consumers willing to adopt smart payments but companies need to guarantee security

Security

Net-security

18.4.19

Attention CISOs: Five steps to get the security funding you need

Security

Net-security

17.4.19

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Security

Securityaffairs

17.4.19

Banks continue to prioritize risk management over customer convenience

Security

Net-security

16.4.19

Open Source Tool From FireEye Automates Analysis of Flash Files

Security

Securityweek

16.4.19

Odd DNS Requests that are Normal

Security

SANS

16.4.19

Bad security hygiene still a major risk for enterprise IT networks

Security

Net-security

16.4.19

As IT security automation increases, so does the need for highly skilled staff

Security

Net-security

16.4.19

What is driving organizations’ cloud adoption?

Security

Net-security

15.4.19

Google introduces many G Suite security enhancements

Security

Net-security

15.4.19

The top emerging risks organizations are facing

Security

Net-security

13.4.19

Bill Introduced to Protect the Privacy Rights of Americans

Security

Bleepingcomputer

12.4.19

VPN apps insecurely store session cookies in memory and log files

Security

Securityaffairs

12.4.19

Microsoft Introduces Security Configuration Framework

Security

Securityweek

12.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

12.4.19

Enterprise VPN apps store authentication and session cookies insecurely

Security

Net-security

12.4.19

Threat Group Uses Pastebin, GitHub In SneakyPastes Operation

Security

Bleepingcomputer

12.4.19

Google Wants To Block Potentially Risky Non-Secure Downloads

Security

Bleepingcomputer

12.4.19

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Security

Securityweek

12.4.19

Many New Security Features, Services Added to Google Cloud

Security

Securityweek

12.4.19

How password-less security benefits helpdesks

Security

Net-security

11.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

11.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

11.4.19

Vendor risk management programs are running harder just to stay in place

Security

Net-security

11.4.19

Finance knocks business and professional services off top spot in four most attacked industries

Security

Net-security

11.4.19

Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

Security

Net-security

10.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

10.4.19

Czech Court: Rights of Alleged Russian Hacker Violated

Security

Securityweek

9.4.19

Is your organization getting physical security right?

Security

Net-security

9.4.19

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Security

Net-security

8.4.19

Perimeter solutions: Do layers of security make a difference?

Security

Net-security

8.4.19

CIOs and CISOs hold off on crucial updates due to potential impact on business operations

Security

Net-security

8.4.19

The unique business-critical threats facing converged IT-OT systems

Security

Net-security

8.4.19

Scaling innovation is critical for digital transformation success, but clearly presents a challenge

Security

Net-security

6.4.19

Google Adding Chrome Admin Policy to Uninstall Blacklisted Extensions

Security

Bleepingcomputer

6.4.19

Beagle: Graph transforms for DFIR data & logs

Security

SANS

5.4.19

Study Shows Screen Time Before Bed Is Not Bad For Teenagers

Security

Bleepingcomputer

5.4.19

Only 12% of enterprises are consistently able to detect insider threats

Security

Net-security

5.4.19

What is shadow mining and why is it a security threat?

Security

Net-security

5.4.19

85% of organizations fail to meet even basic PAM security hygiene

Security

Net-security

5.4.19

Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Security

Net-security

4.4.19

Free Cynet Threat Assessment for Mid-sized and Large Organizations

Security

Threatpost

4.4.19

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Security

Thehackernews

4.4.19

New Waves of Scans Detected by an Old Rule

Security

SANS

4.4.19

Microsoft rolls out new security capabilities for Azure customers

Security

Net-security

4.4.19

Microsoft Paid $2,000,000 in Bounty Rewards in 2018

Security

Securityweek

4.4.19

The security challenges that come with serverless computing

Security

Net-security

3.4.19

Chromium-Based Microsoft Edge Added to Windows 10 Sandbox

Security

Bleepingcomputer

3.4.19

U.S. Airlines Cancel, Delay Flights Because of Aerodata Outage

Security

Bleepingcomputer

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

Security

Bleepingcomputer

3.4.19

To DevSecOps or not to DevSecOps?

Security

Net-security

3.4.19

Digital transformation goes hand-in-hand with Zero Trust security

Security

Net-security

2.4.19

Game of Threats

Security

Securelist

2.4.19

Security Policy Management Firm Tufin Sets Terms for IPO

Security

Securityweek

2.4.19

The CIO’s greatest roadblock to Agile development: Security governance

Security

Net-security

2.4.19

90% of companies interested in crowdsourced security programs

Security

Net-security

2.4.19

Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation

Security

Net-security

2.4.19

45% of taxpayers do not securely store tax documents

Security

Net-security

1.4.19

Intel VISA Tech Can Be Abused, Researchers Allege

Security

Threatpost

1.4.19

Analysis of PDFs Created with OpenOffice/LibreOffice

Security

SANS

1.4.19

How to Marie Kondo your data

Security

Net-security

1.4.19

Nearly all consumers are backing up their computers, but data loss is here to stay

Security

Net-security

30.3.19

Commando VM – Using Windows for pen testing and red teaming

Security

Securityaffairs

29.3.19

New Shodan Monitor service allows tracking Internet-Exposed devices Security

Securityaffairs

29.3.19

Vigilantes Counter Christchurch Manifesto with Weaponized Version

Security

Bleepingcomputer

29.3.19

Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

Security

Net-security

29.3.19

CIOs admit certificate-related outages routinely impact critical business applications and services

Security

Net-security

28.3.19

New Shodan Service Keeps Track of Internet-Exposed Systems

Security

Securityweek

28.3.19

When it comes to file sharing, the cloud has very few downsides

Security

Net-security

28.3.19

Algorithms can now find bugs in computer chips before they are made

Security

Net-security

28.3.19

Third-party cyber risk management is a burden on human and financial resources

Security

Net-security

28.3.19

SMBs willing to invest more to protect their businesses

Security

Net-security

28.3.19

Running your Own Passive DNS Service

Security

SANS

27.3.19

VirusTotal Goes Retro with New ASCII Site for Older Browsers

Security

Bleepingcomputer

27.3.19

Build-time security: Block risk and security issues from production rings

Security

Net-security

27.3.19

61% of CIOs believe employees leak data maliciously

Security

Net-security

27.3.19

Does siloed data negatively impact your organization?

Security

Net-security

26.3.19

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Security

Threatpost

26.3.19

Guilty by association: The reality of online retail third-party data leaks

Security

Net-security

26.3.19

Less than 20% of IT pros have complete access to critical data in public clouds

Security

Net-security

26.3.19

Most companies help employees cover costs to obtain professional certifications

Security

Net-security

25.3.19

The success of the digital workplace depends on the practical implementation of new technology

Security

Net-security

23.3.19

D.C. Attorney General Introduces New Data Security Bill

Security

Securityweek

23.3.19

Analysis: Drone Tech Creates New Type of Blended Threat

Security

Threatpost

23.3.19

Introduction to analysing Go binaries

Security

SANS

22.3.19

Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC

Security

Securityweek

22.3.19

Worldwide spending on security solutions expected to continue growing

Security

Net-security

22.3.19

Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

Security

Net-security

21.3.19

Google Fined $1.7 Billion for Anti-Competitive Practices in Online Advertising

Security

Bleepingcomputer

21.3.19

Researchers Use UPnP Protocol to Unmask IPv6 Address

Security

Securityweek

21.3.19

Windows Hello Support Added to Firefox 66

Security

Securityweek

21.3.19

You may trust your users, but can you trust their files?

Security

Net-security

21.3.19

Latest tactics used by cybercriminals to bypass traditional email security

Security

Net-security

20.3.19

Heeere's Clippy! He's Back, but Only for Microsoft Teams.

Security

Bleepingcomputer

20.3.19

Microsoft Edge Insider Closer to Release With New Installers

Security

Bleepingcomputer

20.3.19

Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!

Security

SANS

20.3.19

A network is only as strong as its weakest shard

Security

Net-security

20.3.19

Unsurprisingly, only 14% of companies are compliant with CCPA

Security

Net-security

20.3.19

Nearly half of organizations lack the necessary talent to maintain security measures

Security

Net-security

19.3.19

Old Tech Spills Digital Dirt on Past Owners

Security

Threatpost

19.3.19

Slack Launched Encryption Key Addon For Businesses

Security

Securityaffairs

19.3.19

Google Open Sources Sandboxed API

Security

Securityweek

19.3.19

Slack Introduces Enterprise Key Management Tool

Security

Securityweek

19.3.19

Wireshark 3.0.0 and Npcap: Some Remarks

Security

SANS

19.3.19

The art of securing ERP applications: Protecting your critical business processes

Security

Net-security

19.3.19

Four key security tips when using any collaboration technology

Security

Net-security

19.3.19

The modern threat landscape and expanding CISO challenges

Security

Net-security

19.3.19

Tax season scaries: How to keep your data safe from insider threats

Security

Net-security

18.3.19

Latest trends in automated threat intelligence-driven network security

Security

Net-security

18.3.19

Meet the new generation of white hats

Security

Net-security

17.3.19

Insider Threats Get Mean, Nasty and Very Personal

Security

Threatpost

16.3.19

New Tune Extension Turns Google Chrome Into a Safe Space

Security

Bleepingcomputer

16.3.19

Google Took Down 2.3 Billion Bad Ads in 2018

Security

Securityweek

15.3.19

It is the first time in the history that civic groups hold a protest against a national CERT

Security

Securityaffairs

15.3.19

Torrent Risks: How to get infected through torrent with a good reputation

Security

Securityaffairs

15.3.19

Binary Analysis with Jupyter and Radare2

Security

SANS

15.3.19

90% of consumers value additional security measures to verify mobile-based transactions

Security

Net-security

15.3.19

Thinking of threat intelligence as a contributing member of your security team

Security

Net-security

15.3.19

Is AI really intelligent or are its procedures just averagely successful?

Security

Net-security

14.3.19

Microsoft Edge Insider Addons Store Discovered, 84 Extensions

Security

Bleepingcomputer

14.3.19

Unsecured API Leads to 'Yelp for Conservatives' App Data Leak

Security

Bleepingcomputer

14.3.19

CCleaner Professional Adds Software Updater Feature

Security

Bleepingcomputer

14.3.19

Public-interest technology: Why companies should get involved

Security

Net-security

14.3.19

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

Security

Threatpost

14.3.19

Three Ways DNS is Weaponized and How to Mitigate the Risk

Security

Threatpost

14.3.19

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Security

Thehackernews

14.3.19

Tip: Ghidra & ZIP Files

Security

SANS

14.3.19

Moving from traditional on-premise solutions to cloud-based security

Security

Net-security

13.3.19

Mozilla releases Firefox Send, a free encrypted file transfer service

Security

Net-security

13.3.19

Data management challenges are having a severe impact on profitability

Security

Net-security

12.3.19

Box Enterprise Shared Links Leak Sensitive Information

Security

Securityweek

12.3.19

Ten Principles for a New Approach to Regulating the Internet

Security

Securityweek

12.3.19

Is your company leaking sensitive data via its Box account?

Security

Net-security

12.3.19

Hidden third-party tags could be leaving Fortune 100 companies at risk

Security

Net-security

11.3.19

Webinar – DevSecOps at Hulu: When security and DevOps meet

Security

Net-security

10.3.19

A Comparison Study of SSH Port Activity - TCP 22 & 2222

Security

SANS

8.3.19

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityaffairs

8.3.19

Analysing meterpreter payload with Ghidra

Security

SANS

8.3.19

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityweek

7.3.19

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

Security

Securityweek

7.3.19

Cybersecurity Startup PolySwarm Launches Malware Detection Marketplace

Security

Securityweek

6.3.19

Sale of SSL/TLS certificates on the dark web is rampant

Security

Net-security

6.3.19

Armor Scientific Emerges From Stealth With Wearable Authentication Solution

Security

Securityweek

6.3.19

Users are too confident in their protection from threats

Security

Net-security

5.3.19

Boost Windows 10 Performance with Retpoline Spectre Mitigation

Security

Bleepingcomputer

5.3.19

Security Shifts Left to be Part of Software Development Best Practice: Report

Security

Securityweek

5.3.19

Alphabet's Chronicle Launches Security Telemetry Platform

Security

Securityweek

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

The patterns of elite DevSecOps practices

Security

Net-security

5.3.19

Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Security

Net-security

4.3.19

Microsoft Rolls Out Spectre Variant 2 Mitigations for Windows 10

Security

Securityweek

4.3.19

KnowBe4 Announces New Funding Round at $800 Million Valuation

Security

Securityweek

4.3.19

Cisco Publishes Annual CISO Benchmark Study

Security

Securityweek

4.3.19

RSAC 2019: An Antidote for Tech Gone Wrong

Security

Threatpost

4.3.19

The Wireshark Foundation released Wireshark 3.0.0 Security

Securityaffairs

4.3.19

A strong security posture starts with application dependency mapping

Security

Net-security

4.3.19

IT teams are struggling with network infrastructure challenges caused by the cloud

Security

Net-security

4.3.19

Organizations are seeing integration challenges hinder digital transformation initiatives

Security

Net-security

3.3.19

Chrome and Firefox Can Take Screenshots of Sites From the Command Line

Security

Bleepingcomputer

3.3.19

First Hacker Millionaire on HackerOne

Security

Bleepingcomputer

2.3.19

Kaspersky AV Having Certificate Conflicts with Google Chromecast

Security

Bleepingcomputer

2.3.19

Wireshark 3 Released with New Npcap Windows Packet Capturing Driver

Security

Bleepingcomputer

2.3.19

YouTube Disables Comments on Videos with Young Children

Security

Bleepingcomputer

2.3.19

Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech

Security

Bleepingcomputer

2.3.19

Two White Hats Earn Over $1 Million via Bug Bounty Programs

Security

Securityweek

1.3.19

Wireshark 3.0.0 Released

Security

Securityweek

1.3.19

Microsoft Unveils New Azure, Windows Defender ATP Tools

Security

Securityweek

1.3.19

Businesses need to rethink security priorities due to shifting trends

Security

Net-security

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

Mozilla May Reject UAE Firm's Root Inclusion Request

Security

Securityweek

26.2.19

Ad Blocking With Pi Hole

Security

SANS

25.2.19

ICANN calls for wholesale DNSSEC deployment

Security

Net-security

25.2.19

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security

Securityaffairs

25.2.19

New Service From Cisco's Duo Labs Analyzes Chrome Extensions

Security

Securityweek

25.2.19

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security

Securityaffairs

25.2.19

Crooks offer millions to skilled black hats to help them in

Security

Securityaffairs

25.2.19

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Security

Threatpost

23.2.19

Pulse Secure Unveils Software Defined Perimeter Solution

Security

Securityweek

22.2.19

Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On

Security

Bleepingcomputer

22.2.19

Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash

Security

Bleepingcomputer

22.2.19

Should you trust that Chrome extension? Use CRXcavator to decide

Security

Net-security

22.2.19

Exposure of sensitive data via cloud applications and services increases 20%

Security

Net-security

22.2.19

92% of organizations rank users as their primary security concern

Security

Net-security

22.2.19

The risks associated with the influx of unauthorized collaboration tools

Security

Net-security

21.2.19

Google's Nest Hub Has a Microphone It Forgot to Mention

Security

Securityweek

21.2.19

Firms Moving Sensitive Data to Cloud, But Security Still a Problem: Oracle

Security

Securityweek

21.2.19

GitHub Increases Rewards, Scope For Bug-Bounty Program

Security

Threatpost

21.2.19

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

Security

Threatpost

21.2.19

Prevent shadow IT: Companies need security covering multiple communication vectors

Security

Net-security

20.2.19

GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards

Security

Bleepingcomputer

20.2.19

Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

Security

Bleepingcomputer

20.2.19

Armorblox Emerges From Stealth With Natural Language Understanding Platform

Security

Securityweek

20.2.19

GitHub Increases Bug Bounty Program Rewards, Expands Scope Security

Securityweek

20.2.19

Microsoft to Kill Updates for Legacy OS Using SHA-1

Security

Threatpost

20.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Security

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security

Securityaffairs

19.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Security

Net-security

19.2.19

Indicators of poor password hygiene exposed

Security

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Security

Net-security

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS

31.1.19

Skyscanner launches a public bug bounty program

Security

Securityaffairs

31.1.19

The Tricky Balance in Declining or Accepting Online Payments

Security

Securityweek

31.1.19

Taking ethical action in identity: 5 steps for better biometrics

Security

Net-security

31.1.19

Microsoft rolls out new tools for enterprise security and compliance teams

Security

Net-security

31.1.19

Tracking Unexpected DNS Changes

Security

Net-security

30.1.19

Travel Search Website Skyscanner Launches Bug Bounty Program

Security

Securityweek

30.1.19

DNS Providers to Cease Implementing DNS Resolver Workarounds

Security

Securityweek

30.1.19

Mozilla Firefox 65 Ups the Ante on Privacy with Anti-Tracking Efforts

Security

Threatpost

30.1.19

Feds Dismantle Dark Web Credentials Market

Security

Threatpost

30.1.19

Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65

Security

Net-security

30.1.19

Enterprises are struggling with cloud complexity and security

Security

Net-security

29.1.19

Salt Security Emerges From Stealth With API Protection Solution

Security

Securityweek

29.1.19

How to Recover Lost or Deleted Files?

Security

Thehackernews

29.1.19

Boardrooms Are Still Not Singing the Security Song

Security

Securityweek

29.1.19

Aztarna – the open-source scanning tool for vulnerable robots

Security

Securityaffairs

29.1.19

How privacy and security concerns affect password practices

Security

Net-security

29.1.19

What steps consumers need to take to protect themselves online

Security

Net-security

29.1.19

Relaying Exchange?s NTLM authentication to domain admin (and more)

Security

SANS

28.1.19

Misinformation Woes Could Multiply With 'Deepfake' Videos

Security

Securityweek

28.1.19

Microsoft 365 Suffers Massive Two Day Outage, Outlook and Exchange Down

Security

Bleepingcomputer

28.1.19

Google Chrome Adding Support for Signed HTTP Exchanges

Security

Bleepingcomputer

28.1.19

Microsoft To-Do Beta Finally Lets You Attach Files to Tasks

Security

Bleepingcomputer

28.1.19

Resolve to Be More Involved In Your Local Community - REVISITED

Security

SANS

28.1.19

How to know when you’re ready for a fractional CISO

Security

Net-security

28.1.19

How accepting that your network will get hacked will help you develop a plan to recover faster

Security

Net-security

26.1.19

Are you Ready for DNS Flag Day?

Security

SANS

25.1.19

CISSP Price Hike Dismays Certified Security Professionals

Security

Securityweek

25.1.19

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Security

Securityweek

25.1.19

Fighting Fire with Fire: API Automation Risks

Security

Threatpost

25.1.19

The most effective security strategies to guard sensitive information

Security

Net-security

25.1.19

Enterprises turn to MSPs to mitigate huge skills gap concerns

Security

Net-security

24.1.19

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Security

Bleepingcomputer

24.1.19

Millions of PCs Found Running Outdated Versions of Popular Software

Security

Thehackernews

24.1.19

WhiteHat Security Launches New Software Testing Products

Security

Securityweek

24.1.19

Branching out more efficiently and securely with SD-WAN

Security

Net-security

24.1.19

Reimagining risk management to mitigate looming economic dangers

Security

Net-security

23.1.19

Arizona Lawmaker Wants to Tax Porn to Fund Border Security

Security

Bleepingcomputer

23.1.19

Outdated Software Exposes PC Users to Security Risks Says Report

Security

Bleepingcomputer

22.1.19

VLC Responds to Criticism Over Lack of HTTPS for Updates

Security

Securityweek

22.1.19

Business resilience should be a core company strategy, so why are businesses struggling to take action?

Security

Net-security

22.1.19

Agents of disruption: Four testing topics argue the case for agentless security

Security

Net-security

21.1.19

Microsoft launches Azure DevOps bug bounty program

Security

Net-security

21.1.19

Beware the man in the cloud: How to protect against a new breed of cyberattack

Security

Net-security

21.1.19

Machine learning trumps AI for security analysts

Security

Net-security

20.1.19

Mozilla is Adding an Ad Blocker to Firefox Focus 9.0

Security

Bleepingcomputer

19.1.19

PCI SSC Releases New Security Standards for Payment Software

Security

Securityweek

19.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Securityweek

19.1.19

Threatpost News Wrap Podcast For Jan. 18

Security

Threatpost

18.1.19

Microsoft Launches Azure DevOps Bounty Program

Security

Bleepingcomputer

18.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Threatpost

18.1.19

New requirements for the secure design and development of modern payment software

Security

Net-security

17.1.19

I swiped right, Viewing sensitive data cached in your Safari browser.

Security

Securityaffairs

17.1.19

WordPress to Warn on Outdated PHP Versions

Security

Securityweek

15.1.19

Reminder: Microsoft to end support for Windows 7 in 1-year from today

Security

Thehackernews

15.1.19

Mozilla will disable Adobe Flash by default starting from Firefox 69

Security

Securityaffairs

15.1.19

Security Expectations and Mis-Conceptions in Migrating ERP to the Cloud

Security

Securityweek

15.1.19

Firefox 69 to Disable Adobe Flash by Default

Security

Securityweek

15.1.19

43% of businesses are still running Windows 7, security threats remain

Security

Net-security

15.1.19

How to build a better CISO

Security

Net-security

15.1.19

Mozilla Kills Default Support for Adobe Flash in Firefox 69

Security

Threatpost

14.1.19

Mozilla to Disable Flash Plugin by Default in Firefox 69

Security Bleepingcomputer

14.1.19

Most organizations are migrating data for ERP apps to the cloud

Security

Net-security

13.1.19

US Carriers Promise Again to Stop Selling Customer Location Data

Security

Bleepingcomputer

13.1.19

Microsoft 365 Business Gets Self Service Password Reset Writeback

Security

Bleepingcomputer

12.1.19

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

Security

Threatpost

11.1.19

Google Secures Public DNS Queries With DNS-over-TLS

Security Securityweek

11.1.19

Hyatt Hotels Launches Public Bug Bounty Program

Security Securityweek

11.1.19

There’s a sizable gap between confidence in security programs and their effectiveness

Security

Net-security

11.1.19

Google Search Results Spoofed to Create Fake News

Security

Threatpost

10.1.19

Reddit Users Locked Out of Their Accounts for Unusual Activity

Security

Bleepingcomputer

10.1.19

Google Chrome Ad Blocker Expands Worldwide Starting July 9th

Security

Bleepingcomputer

10.1.19

Google Adds DNS-over-TLS Support to Its Public DNS Service

Security

Bleepingcomputer

10.1.19

Hyatt Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

10.1.19

Google Rolls Out Activity Cards to Help You Find Past Searches

Security

Bleepingcomputer

10.1.19

Microsoft Debuts Azure Migrate and Azure Site Recovery Enhancements

Security

Bleepingcomputer

10.1.19

Microsoft Adding Office 365 Threat Auto-Investigation to GCC Offering

Security Bleepingcomputer
10.1.19

Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

Security Thehackernews
10.1.19

Understanding how data becomes intelligence is central for any successful security program

Security Net-security
10.1.19

Small manufacturers play important role in supply chain security

Security Net-security
10.1.19

G Suite warns admins about domain data exfiltration attempts

Security Net-security

9.1.19

Transmute Launches Blockchain Framework Focused on Identity

Security Securityweek

9.1.19

Sophos Acquires Cloud Security Firm Avid Secure

Security Securityweek

9.1.19

gganimate: Animate YouR Security Analysis

Security

SANS

9.1.19

Popular coding advice doesn’t necessarily equal secure coding advice

Security

Net-security

8.1.19

Microsoft told to Pay €1100 After Forced Windows 10 Upgrade Breaks PC

Security Bleepingcomputer

8.1.19

Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever

Security Thehackernews

8.1.19

Zerodium offers $2 million for remote iOS jailbreak, $1 million for WhatsApp RCE

Security

Net-security

8.1.19

Akamai Acquires Identity Management Firm Janrain

Security Securityweek

8.1.19

ThreatList: Container Security Lags Amidst DevOps Enthusiasm

Security

Threatpost

7.1.19

US Gadget Love Forecast to Grow Despite Trust Issues Security Securityweek

7.1.19

Shifting the burden: Long-term magnifying consequence

Security

Net-security

7.1.19

The attack surface is growing faster than it has at any other point in the history of technology

Security

Net-security

7.1.19

Security analytics to reach $12 billion by 2024

Security

Net-security

5.1.19

Weather Channel App in a Deluge of Legal Trouble for Data Misuse

Security Threatpost

3.1.19

After 3 years, Google partially fixes a bug in Android Google Chrome

Security Securityaffairs

3.1.19

Microsoft Adds New Microsoft 365 Security and Compliance Bundles Security Bleepingcomputer

3.1.19

Security Concerns Prompt Closing of Dividend Applications Security Securityweek

3.1.19

Automated System Bypasses Google reCAPTCHA Again Security Securityweek

3.1.19

New unCaptcha automated system bypasses Google reCAPTCHA once again Security Securityaffairs

2.1.19

wget utility potential leaked password via extended filesystem attributes Security Securityaffairs
31.12.18

French Startup Offers Dark Web Compass, But Not for Everyone

Security Securityweek

30.12.18

‘Snowden Refugee’ Has No Regrets for Helping Whistleblower

Security

Threatpost

30.12.18

Video: De-DOSfuscation Example

Security

SANS

28.12.18

Top 2018 Security and Privacy Stories

Security

Threatpost

22.12.18

Singapore Government Announces Second Bug Bounty Program

Security Securityweek

20.12.18

Microsoft's Windows Sandbox Runs Programs in an Isolated Desktop

Security

Thehackernews

20.12.18

Using OSSEC Active-Response as a DFIR Framework

Security

SANS

20.12.18

An overview of the Attivo Networks solution

Security

Net-security

19.12.18

Untangle Partners With Malwarebytes to Bring Layered Security to SMBs

Security

Securityweek

19.12.18

Oath Paid Out $5 Million in Bug Bounties in 2018

Security

Securityweek

18.12.18

WSJ Webpage Defaced to Support PewDiePie

Security

Threatpost

18.12.18

Automotive Security: It’s More Than Just What’s Under The Hood

Security

Threatpost

18.12.18

New Extortion Email Threatens to Send a Hitman Unless You Pay 4K

Security Bleepingcomputer

18.12.18

Delivering security and continuity for the cities of tomorrow

Security

Net-security

18.12.18

Automotive Security: It’s More Than Just What’s Under The Hood

Security

Net-security

16.12.18

Which are the worst passwords for 2018?

Security

Securityaffairs

15.12.18

Microsoft Launches AI Malware Prediction Competition with $25K Prize

Security

Bleepingcomputer

15.12.18

123456 Is the Most Used Password for the 5th Year in a Row

Security

Bleepingcomputer

14.12.18

Save the Children Federation Duped in $1M Scam

Security

Net-security

14.12.18

Save the Children Charity Org Scammed for Almost $1 Million Security Bleepingcomputer

14.12.18

Arctic Wolf Acquires Risk Assessment Firm RootSecure Security Securityweek

14.12.18

Grammarly Launches Public Bug Bounty Program

Security

Net-security

13.12.18

GitLab Launches Public Bug Bounty Program

Security

Securityweek

13.12.18

Grammarly Launches Public Bug Bounty Program Security Securityweek

13.12.18

Deception technology: Authenticity and why it matters

Security

Net-security

12.12.18

Claroty Adds New Capabilities to Industrial Security Platform Security Securityweek

12.12.18

Hertz, Clear Partner to Speed Rentals With Biometric Scans Security Securityweek

11.12.18

Mozilla Firefox 64.0 Released - Here's What's New

Security Bleepingcomputer

11.12.18

Biometrics: Security Solution or Issue?

Security

Threatpost

11.12.18

Guide: 5 Steps to Modernize Security in the DevSecOps Era

Security

Net-security

10.12.18

How can businesses get the most out of pentesting?

Security

Net-security

7.12.18

Google Launches Cloud Security Command Center in Beta Security Securityweek

7.12.18

DNA Testing Kits & The Security Risks in Digitized DNA Security Bleepingcomputer

6.12.18

Data Exfiltration in Penetration Tests

Security

SANS

4.12.18

Mozilla to Provide MSI Installers Starting with Firefox 65 Security Bleepingcomputer

4.12.18

Microsoft building Chrome-based browser to replace Edge on Windows 10 Security Thehackernews
3.12.18 Mozilla to Provide MSI Installers Starting with Firefox 65 Security Bleepingcomputer
1.12.18 MITRE evaluates Enterprise security products using the ATT&CK Framework

Security

Securityaffairs

1.12.18

Mozilla Testing DNS-over-HTTPS in Firefox

Security

Securityweek

1.12.18

Bing Warns VLC Media Player Site is ‘Suspicious’ in Likely False-Positive Gaff

Security

Threatpost

30.11.18 Mitre Uses ATT&CK Framework to Evaluate Enterprise Security Products

Security

Securityweek
30.11.18 Google Makes Secure LDAP Generally Available

Security

Securityweek
30.11.18 Mozilla Firefox Expands DNS-over-HTTPS (DoH) Test to Release Channel

Security

Bleepingcomputer

29.11.18

AWS Security Hub Aggregates Alerts From Third-Party Tools

Security

Securityweek
29.11.18 Knock-Knock Docker!! Will you let me in? Open API Abuse in Docker Containers

Security

Securityaffairs

29.11.18

Bing is Warning that the VLC Media Player Site is Unsafe

Security

Bleepingcomputer

27.11.18

Acceptto Emerges from Stealth with Behavioral Biometric Authentication Platform

Security

Securityweek

27.11.18

Researchers Use Smart Bulb for Data Exfiltration

Security

Securityweek

27.11.18

Orkus Exits Stealth Mode With Cloud Security Platform

Security

Securityweek

23.11.18

ThreatList: One-Third of Firms Say Their Container Security Lags

Security

Threatpost

22.11.18

Zero-Trust Frameworks: Securing the Digital Transformation

Security

Threatpost

22.11.18

Mozilla Overhauls Content Blocking Settings in Firefox 65

Security

Bleepingcomputer

20.11.18 Microsoft Enhances Windows Defender ATPSecurity PBWCZ.CZ

17.11.18

Speech Synthesis API Being Restricted in Chrome 71 Due to Abuse

Security

Bleepingcomputer

16.11.18

Firefox Now Shows Warnings On Sites with Data Breaches

Security

Bleepingcomputer
16.11.18 GreatHorn Expands Email Security PlatformSecurity PBWCZ.CZ
16.11.18 Firefox Alerts Users When Visiting Breached SitesSecurity PBWCZ.CZ
16.11.18 Black Friday alertSecurity PBWCZ.CZ

15.11.18

Why you need to know about Penetration Testing and Compliance Audits?

Security

Thehackernews
15.11.18 Misconfiguration a Top Security Concern for ContainersSecurity PBWCZ.CZ
15.11.18

Managing the Risk of IT-OT Convergence

Security

Threatpost

13.11.18 IT threat evolution Q3 18. Statistics

Analysis  Cyber  Cryptocurrency  Security

PBWCZ.CZ

8.11.18 World Wide Web Inventor Wants New 'Contract' to Make Web SafeSecurity PBWCZ.CZ
7.11.18 Psycho-Analytics Could Aid Insider Threat DetectionSecurity PBWCZ.CZ
2.11.18 Google Boosts Account Security With New Tools, ProtectionsSecurity PBWCZ.CZ
2.11.18 Law Enforcement Faces Dilemma in Assessing Online ThreatsSecurity PBWCZ.CZ
30.10.18 Google Launches reCAPTCHA v3Security PBWCZ.CZ
25.10.18 Firefox 63 Blocks Tracking CookiesSecurity PBWCZ.CZ
25.10.18 Google Blocks New Ad Fraud SchemeSecurity PBWCZ.CZ
24.10.18 The Rise of The Virtual Security OfficerSecurity PBWCZ.CZ
24.10.18 Mozilla Offers VPN Service to Firefox UsersSecurity PBWCZ.CZ
24.10.18 Oracle Adds New Security Services to Cloud PlatformSecurity PBWCZ.CZ
24.10.18 Fortinet Tackles Insider Threats with ZoneFox AcquisitionSecurity PBWCZ.CZ
23.10.18 Securing the Vote Against Increasing ThreatsSecurity PBWCZ.CZ
18.10.18 Tech Giants Concerned About Australia's Encryption LawsSecurity PBWCZ.CZ
14.10.18 Purging Long-Forgotten Online Accounts: Worth the Trouble?Security PBWCZ.CZ
12.10.18 Mozilla Delays Distrust of Symantec CertificatesSecurity PBWCZ.CZ
10.10.18 KnowBe4 Brings Artificial Intelligence to Security Awareness TrainingSecurity PBWCZ.CZ
9.10.18 How Secure Are Bitcoin Wallets, Really?Security PBWCZ.CZ
7.10.18 Windows 10 October 18 Update could cause CCleaner stop workingSecurity PBWCZ.CZ
5.10.18 Hackers Earn $150,000 in Marine Corps Bug Bounty ProgramSecurity PBWCZ.CZ
5.10.18 Wickr Announces General Availability of Anti-Censorship ToolSecurity PBWCZ.CZ
28.9.18 Chronicle Unveils VirusTotal EnterpriseSecurity PBWCZ.CZ
25.9.18 Microsoft Boosts Azure Security With Array of New ToolsSecurity PBWCZ.CZ
25.9.18 Symantec Completes Internal Accounting InvestigationSecurity PBWCZ.CZ
24.9.18 Cloudflare Launches Security Service for Tor UsersSecurity PBWCZ.CZ
20.9.18 New Tool Helps G Suite Admins Uncover Security ThreatsSecurity PBWCZ.CZ
15.9.18 Secureworks Launches New Security Maturity ModelSecurity PBWCZ.CZ
12.9.18 OpenSSL 1.1.1 Released With TLS 1.3, Security ImprovementsSecurity PBWCZ.CZ
10.9.18 Google Launches Alert Center for G SuiteSecurity PBWCZ.CZ
23.11.18 Kaspersky Security Bulletin: Threat Predictions for 2019Security PBWCZ.CZ
8.9.18 Microsoft to Charge for Windows 7 Security UpdatesSecurity PBWCZ.CZ
7.9.18 Fighting Alert Fatigue With Security Orchestration, Automation and ResponseSecurity PBWCZ.CZ
6.9.18 Mozilla Appoints New Policy, Security ChiefSecurity PBWCZ.CZ
6.9.18 Uber Announces Ramped Up Passenger SecuritySecurity PBWCZ.CZ
4.9.18 Arjen Kamphuis, the Dutch associate of Julian Assange, went missing in NorwaySecurity PBWCZ.CZ
24.8.18 Oath Pays Over $1 Million in Bug BountiesSecurity PBWCZ.CZ
21.8.18 Code of App Security Tool Posted to GitHubSecurity PBWCZ.CZ
17.8.18 ESET Launches New Enterprise Security ToolsSecurity PBWCZ.CZ
9.8.18 New G Suite Alerts Provide Visibility Into Suspicious User ActivitySecurity PBWCZ.CZ
8.8.18 NERC Names Bill Lawrence as VP, Chief Security OfficerSecurity PBWCZ.CZ
8.8.18 Enterprises: Someone on Your Security Team is Likely a Grey Hat HackerSecurity PBWCZ.CZ
8.8.18 New Law May Force Small Businesses to Reveal Data PracticesSecurity PBWCZ.CZ
6.8.18 Mozilla to Researchers: Stay Away From User Data and We Won’t SueSecurity PBWCZ.CZ
5.8.18 Do Businesses Know When They’re Using Unethical Data?Security PBWCZ.CZ
1.8.18 Mozilla Reinforces Commitment to Distrust Symantec CertificatesSecurity PBWCZ.CZ
30.7.18 State of Email Security: What Can Stop Email Threats?Security PBWCZ.CZ
28.7.18 Google Announces New Security Tools for Cloud CustomersSecurity PBWCZ.CZ
26.7.18 Chrome Now Marks HTTP Sites as "Not Secure"Security PBWCZ.CZ
22.7.18 Expert discovered it was possible to delete all projects in the Microsoft Translator HubSecurity PBWCZ.CZ
20.7.18 ‘IT system issue’ caused cancellation of British Airways cancelled flights at HeathrowSecurity PBWCZ.CZ
19.7.18 Microsoft Offers $100,000 in New Identity Bug Bounty ProgramSecurity PBWCZ.CZ
18.7.18 Support for Python Packages Added to GitHub Security AlertsSecurity PBWCZ.CZ
18.7.18 Intel Pays $100,000 Bounty for New Spectre VariantsSecurity PBWCZ.CZ
12.7.18 Intel pays a $100K bug bounty for the new CPU Spectre 1.1 flawSecurity PBWCZ.CZ
3.7.18 Mozilla Announces Root Store Policy UpdateSecurity PBWCZ.CZ
22.6.18 Hidden Tunnels: A Favored Tactic to Evade Strong Access ControlsSecurity PBWCZ.CZ
22.6.18 Microsoft Combats Bad Passwords With New Azure ToolsSecurity PBWCZ.CZ
22.6.18 6 Security Flaws in Smart Speakers You Need to Know AboutSecurity PBWCZ.CZ
21.6.18 Chronicle launches VirusTotal Monitor to reduce false positivesSecurity PBWCZ.CZ
20.6.18 New VirusTotal Service Aims to Reduce False PositivesSecurity PBWCZ.CZ
8.6.18 Google Won't Use Artificial Intelligence for WeaponsSecurity PBWCZ.CZ
8.6.18 FIFA public Wi-Fi guide: which host cities have the most secure networks?Security PBWCZ.CZ
7.6.18 ALTR Emerges From Stealth With Blockchain-Based Data Security SolutionSecurity PBWCZ.CZ
6.6.18 Thousands of organizations leak sensitive data via misconfigured Google GroupsSecurity PBWCZ.CZ
31.5.18 HTTP Parameter Pollution Leads to reCAPTCHA BypassSecurity PBWCZ.CZ
23.5.18 Chinese researchers from Tencent discovered exploitable flaws in several BMW modelsSecurity PBWCZ.CZ
21.5.18 Utimaco to Acquire Atalla Hardware Security Module Business From Micro FocusSecurity PBWCZ.CZ