Latest Posts

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

FIN6 Hackers Update Arsenal of Techniques

September 11, 2018 Added by:Ionut Arghire

A cybercriminal group focused on stealing payment card data records has been using new tactics, techniques and procedures (TTPs) in attacks observed in 2017 and 2018, IBM X-Force security researchers report.

Comments  (0)

A4ea6d6b9e1d62beff019069abdb7dfd

Hackers and Worms in the Singularity

September 07, 2018 Added by:David Holmes

On one path to the Singularity, hacking is the worst possible crime. But on the other path, hacking is humanity’s highest calling. Either way, the absolute value of hackers is going to be maximal.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Trojanized Extension Uploaded to Google’s Chrome Store

September 07, 2018 Added by:Ionut Arghire

A trojanized version of the MEGA extension was uploaded to the Google Chrome webstore and automatically pushed to users via the autoupdate mechanism.

Comments  (0)

8d109f28623b3d0bd57500ba35f914e1

Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?

September 06, 2018 Added by:Rishi Bhargava

SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.

Comments  (0)

26104e7f12ca49e1208007765787726d

New Payment Tech, New Security Challenges

September 04, 2018 Added by:Simon Blake-Wilson

New apps and technologies present payment providers with new types of threats.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)