Researchers at Black Hat USA will show how vulnerabilities in Microsoft’s Cortana highlight the need to balance security with convenience. Security vs. convenience is a delicate balance to strike...
Read moreThe U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development...
Read moreNew Drupal Exploit Mines Monero for Attackers
June 23 2018A new exploit of a known vulnerability gives an attacker control of the Drupal-hosting server. A newly discovered vulnerability in Drupal has been exploited to turn infected systems into...
Read moreSophos warns of a ‘protection racket’ scam email that threatens to infect victims with the ransomware variant if they don’t pay the attackers. A widespread new email scam purportedly...
Read moreArtificial Intelligence & the Security Market
June 22 2018A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs. Machine learning, advanced heuristics, or artificial intelligence:...
Read moreMore than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months. Incidents like last year’s...
Read morePatch and Update
June 22 2018The SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreA series of newly disclosed vulnerabilities could allow an attacker to gain control of industrial switches. Phoenix Contact has disclosed four vulnerabilities in switches in the FL SWITCH industrial...
Read moreAppSec in the World of ‘Serverless’
June 21 2018The term ‘application security’ still applies to ‘serverless’ technology, but the line where application settings start and infrastructure ends is blurring. “Serverless” computing is essentially an application deconstructed to...
Read moreThreat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says. An advanced persistent threat group...
Read more
Recent Comments