The Adwind remote access Trojan conceals malicious activity in Java commands to slip past threat intelligence tools and steal user data. The Adwind jRAT, a remote access Trojan known...
Read moreWhy Cloud-Native Applications Need Cloud-Native Security
October 30 2019Today’s developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide. The rise of...
Read moreWhy Cloud-Native Applications Need Cloud-Native Security
October 30 2019Today’s developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide. The rise of...
Read moreEarn your IoT security certification
October 29 2019Certified IoT Security Practitioner at a Glance Who will most benefit from this course: Practitioners looking to demonstrate a vendor-neutral, cross-industry skill set to design, implement, operate and/or manage...
Read moreEarn your IoT security certification
October 29 2019Certified IoT Security Practitioner at a Glance Who will most benefit from this course: Practitioners looking to demonstrate a vendor-neutral, cross-industry skill set to design, implement, operate and/or manage...
Read moreSecurity experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities. Paper ballots and risk-limiting audits — the manual...
Read moreSecurity experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities. Paper ballots and risk-limiting audits — the manual...
Read morePwn2Own Adds Industrial Control Systems to Hacking Contest
October 29 2019The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January. Vulnerability research competition Pwn2Own is expanding to include industrial control system (ICS),...
Read morePwn2Own Adds Industrial Control Systems to Hacking Contest
October 29 2019The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January. Vulnerability research competition Pwn2Own is expanding to include industrial control system (ICS),...
Read more
Recent Comments