Latest Posts
Top Three Cross-Site Scripting Attacks You Need to Know Now
July 31, 2019 Added by:Johnny Rice
Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.
Comments (0)
Arkose Labs Launches Private Bug Bounty Program
July 29, 2019 Added by:Ionut Arghire
Fraud prevention technology provider Arkose Labs announced the launch of a private bug bounty program on crowdsourced security platform Bugcrowd.
Comments (0)
Eight Steps to Migrate Your SIEM
July 22, 2019 Added by:Trevor Daughney
The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.
Comments (0)
What Call Center Fraud Can Teach Us about Insider Threats
July 22, 2019 Added by:Saryu Nayyar
Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.
Comments (0)
Best Practices for Remote Workers’ Endpoint Security
July 22, 2019 Added by:Mathivanan Venkatachalam
One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.
Comments (0)
Cisco Patches Critical Flaw in Vision Dynamic Signage Director
July 20, 2019 Added by:Ionut Arghire
Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.
Comments (0)
Cybersecurity: Drones Will Soon Become Both Predator and Prey
July 19, 2019 Added by:Steve Durbin
Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.
Comments (0)
The Automotive Industry: Stepping up on Defense
July 19, 2019 Added by:David Barzilai
As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.
Comments (0)
Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics
July 19, 2019 Added by:Filip Truta
Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.
Comments (0)
Today’s Top Public Cloud Security Threats …And How to Thwart Them
June 21, 2019 Added by:Michael Koyfman
In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.
Comments (0)
Influence Operation Uses Old News of New Purposes
June 18, 2019 Added by:Ionut Arghire
A recently uncovered influence campaign presents old terror news stories as if they were new, likely in an attempt to spread fear and uncertainty, Recorded Future reports.
Comments (0)
Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season
June 14, 2019 Added by:David Stuart
Tips for cleaning and securing your online data this spring.
Comments (0)
Building Modern Security Awareness with Experiences
June 14, 2019 Added by:Perry Carpenter
Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.
Comments (0)
The Promise and Perils of Artificial Intelligence
June 14, 2019 Added by:Boris Cipot
AI will help us to improve our lives. We, in turn, must ensure that the software doing so is secure.
Comments (0)
Utilising the Benefits of Industrial Robots Securely
June 05, 2019 Added by:Jalal Bouhdada
The benefits of industrial robots won’t be achieved for long if they are not deployed with cybersecurity at their core.
Comments (0)
On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure
June 04, 2019 Added by:Steve Durbin
Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.
Comments (0)
Thoughts on DoS Attack on US Electric Utility
June 04, 2019 Added by:Phil Neray
The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.
Comments (0)
Network of Fake Social Accounts Serves Iranian Interests
May 29, 2019 Added by:Ionut Arghire
FireEye security researchers have uncovered a network of fake social media accounts that engage in inauthentic behavior and misrepresentation, likely in support of Iranian political interests.
Comments (0)
Researchers Analyze the Linux Variant of Winnti Malware
May 28, 2019 Added by:Ionut Arghire
Chronicle, the cybersecurity arm of Google’s parent Alphabet, has identified and analyzed samples of the Winnti malware that have been designed specifically for the Linux platform.
Comments (0)
BlackWater Campaign Linked to MuddyWater Cyberspies
May 21, 2019 Added by:Ionut Arghire
A recently discovered campaign shows that the cyber-espionage group MuddyWater has updated tactics, techniques and procedures (TTPs) to evade detection, Talos’ security researchers report.