- Security -

Last update 09.10.2017 13:17:23

HOME  2019  2018  1  2  3  4  5  6



Date

Name

Category

Web

30.4.19

Windows Security Update Caused Recent Antivirus Conflicts and Freezes

Security

Bleepingcomputer

30.4.19

Making the most of threat intelligence with threat intelligence gateways

Security

Net-security

29.4.19

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Security

Securityaffairs

29.4.19

GE trade secret theft case demonstrates need for document behavior monitoring

Security

Net-security

27.4.19

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Security

Threatpost

27.4.19

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Security

Threatpost

27.4.19

Microsoft Removes Password-Expiration Policy in Windows 10

Security

Securityweek

26.4.19

NIST Tool Finds Errors in Complex Safety-Critical Software

Security

Securityweek

26.4.19

The strengths and weaknesses of different VPN protocols

Security

Securityaffairs

26.4.19

Service Accounts Redux - Collecting Service Accounts with PowerShell

Security

SANS

26.4.19

Best practices when implementing SD-WAN

Security

Net-security

26.4.19

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Security

Net-security

26.4.19

Global spending on digital transformation to reach $1.18 trillion in 2019

Security

Net-security

26.4.19

Established companies leveraging fintech capabilities for growth

Security

Net-security

25.4.19

Facial Recognition is Here: But Are We Ready?

Security

Threatpost

25.4.19

Poll: Are You Creeped Out by Facial Recognition?

Security

Threatpost

25.4.19

You can’t fix what you can’t see: A new way of looking at network performance

Security

Net-security

25.4.19

Researchers develop new tool for safety-critical software testing

Security

Net-security

25.4.19

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

Security

Net-security

24.4.19

Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators

Security

SANS

24.4.19

A casual approach to workplace communications presents major security risks

Security

Net-security

23.4.19

Whitepaper: Third-Party Risk to the Nth Degree

Security

Net-security

23.4.19

Windows April Updates Also Have Problems with McAfee Software

Security

Bleepingcomputer

23.4.19

Microsoft Windows Defender ATP APIs Now Generally Available

Security

Bleepingcomputer

23.4.19

Windows 7 Now Showing End of Support Warnings

Security

Bleepingcomputer

23.4.19

The foundation: Quantifying risk with focused security measurement

Security

Net-security

23.4.19

Scientists may have identified a new way to improve network security

Security

Net-security

20.4.19

Avast, Avira, Sophos and other antivirus solutions show problems after

Security

Securityaffairs

20.4.19

Mozilla Firefox to Enable Hyperlink Ping Tracking By Default

Security

Bleepingcomputer

20.4.19

The New Microsoft Edge Sometimes Impersonates Other Browsers

Security

Bleepingcomputer

20.4.19

Google to Block Logins from Embedded Browser Frameworks

Security

Bleepingcomputer

20.4.19

Windows 10 Application Guard Added to the New Microsoft Edge

Security

Bleepingcomputer

19.4.19

UK Announces Introduction of Online Pornography Age Checks in July

Security

Bleepingcomputer

19.4.19

Mysterious Operative Haunted Kaspersky Critics

Security

Securityweek

19.4.19

Fortinet Settles Whistleblower Case for $545,000

Security

Securityweek

19.4.19

DevSecOps: Fast development without sacrificing safety

Security

Net-security

19.4.19

Google will check apps by new developers more thoroughly

Security

Net-security

19.4.19

Building a modern data registry: Go beyond data classification

Security

Net-security

19.4.19

The biggest hurdles to digital transformation initiatives? Budget and top-down support

Security

Net-security

18.4.19

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

Security

Net-security

18.4.19

One hundred percent of endpoint security tools eventually fail

Security

Net-security

18.4.19

The perimeter is vanishing, how will you secure your network?

Security

Net-security

18.4.19

Consumers willing to adopt smart payments but companies need to guarantee security

Security

Net-security

18.4.19

Attention CISOs: Five steps to get the security funding you need

Security

Net-security

17.4.19

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Security

Securityaffairs

17.4.19

Banks continue to prioritize risk management over customer convenience

Security

Net-security

16.4.19

Open Source Tool From FireEye Automates Analysis of Flash Files

Security

Securityweek

16.4.19

Odd DNS Requests that are Normal

Security

SANS

16.4.19

Bad security hygiene still a major risk for enterprise IT networks

Security

Net-security

16.4.19

As IT security automation increases, so does the need for highly skilled staff

Security

Net-security

16.4.19

What is driving organizations’ cloud adoption?

Security

Net-security

15.4.19

Google introduces many G Suite security enhancements

Security

Net-security

15.4.19

The top emerging risks organizations are facing

Security

Net-security

13.4.19

Bill Introduced to Protect the Privacy Rights of Americans

Security

Bleepingcomputer

12.4.19

VPN apps insecurely store session cookies in memory and log files

Security

Securityaffairs

12.4.19

Microsoft Introduces Security Configuration Framework

Security

Securityweek

12.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

12.4.19

Enterprise VPN apps store authentication and session cookies insecurely

Security

Net-security

12.4.19

Threat Group Uses Pastebin, GitHub In SneakyPastes Operation

Security

Bleepingcomputer

12.4.19

Google Wants To Block Potentially Risky Non-Secure Downloads

Security

Bleepingcomputer

12.4.19

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Security

Securityweek

12.4.19

Many New Security Features, Services Added to Google Cloud

Security

Securityweek

12.4.19

How password-less security benefits helpdesks

Security

Net-security

11.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

11.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

11.4.19

Vendor risk management programs are running harder just to stay in place

Security

Net-security

11.4.19

Finance knocks business and professional services off top spot in four most attacked industries

Security

Net-security

11.4.19

Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

Security

Net-security

10.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

10.4.19

Czech Court: Rights of Alleged Russian Hacker Violated

Security

Securityweek

9.4.19

Is your organization getting physical security right?

Security

Net-security

9.4.19

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Security

Net-security

8.4.19

Perimeter solutions: Do layers of security make a difference?

Security

Net-security

8.4.19

CIOs and CISOs hold off on crucial updates due to potential impact on business operations

Security

Net-security

8.4.19

The unique business-critical threats facing converged IT-OT systems

Security

Net-security

8.4.19

Scaling innovation is critical for digital transformation success, but clearly presents a challenge

Security

Net-security

6.4.19

Google Adding Chrome Admin Policy to Uninstall Blacklisted Extensions

Security

Bleepingcomputer

6.4.19

Beagle: Graph transforms for DFIR data & logs

Security

SANS

5.4.19

Study Shows Screen Time Before Bed Is Not Bad For Teenagers

Security

Bleepingcomputer

5.4.19

Only 12% of enterprises are consistently able to detect insider threats

Security

Net-security

5.4.19

What is shadow mining and why is it a security threat?

Security

Net-security

5.4.19

85% of organizations fail to meet even basic PAM security hygiene

Security

Net-security

5.4.19

Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Security

Net-security

4.4.19

Free Cynet Threat Assessment for Mid-sized and Large Organizations

Security

Threatpost

4.4.19

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Security

Thehackernews

4.4.19

New Waves of Scans Detected by an Old Rule

Security

SANS

4.4.19

Microsoft rolls out new security capabilities for Azure customers

Security

Net-security

4.4.19

Microsoft Paid $2,000,000 in Bounty Rewards in 2018

Security

Securityweek

4.4.19

The security challenges that come with serverless computing

Security

Net-security

3.4.19

Chromium-Based Microsoft Edge Added to Windows 10 Sandbox

Security

Bleepingcomputer

3.4.19

U.S. Airlines Cancel, Delay Flights Because of Aerodata Outage

Security

Bleepingcomputer

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

Security

Bleepingcomputer

3.4.19

To DevSecOps or not to DevSecOps?

Security

Net-security

3.4.19

Digital transformation goes hand-in-hand with Zero Trust security

Security

Net-security

2.4.19

Game of Threats

Security

Securelist

2.4.19

Security Policy Management Firm Tufin Sets Terms for IPO

Security

Securityweek

2.4.19

The CIO’s greatest roadblock to Agile development: Security governance

Security

Net-security

2.4.19

90% of companies interested in crowdsourced security programs

Security

Net-security

2.4.19

Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation

Security

Net-security

2.4.19

45% of taxpayers do not securely store tax documents

Security

Net-security

1.4.19

Intel VISA Tech Can Be Abused, Researchers Allege

Security

Threatpost

1.4.19

Analysis of PDFs Created with OpenOffice/LibreOffice

Security

SANS

1.4.19

How to Marie Kondo your data

Security

Net-security

1.4.19

Nearly all consumers are backing up their computers, but data loss is here to stay

Security

Net-security

30.3.19

Commando VM – Using Windows for pen testing and red teaming

Security

Securityaffairs

29.3.19

New Shodan Monitor service allows tracking Internet-Exposed devicesSecurity

Securityaffairs

29.3.19

Vigilantes Counter Christchurch Manifesto with Weaponized Version

Security

Bleepingcomputer

29.3.19

Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

Security

Net-security

29.3.19

CIOs admit certificate-related outages routinely impact critical business applications and services

Security

Net-security

28.3.19

New Shodan Service Keeps Track of Internet-Exposed Systems

Security

Securityweek

28.3.19

When it comes to file sharing, the cloud has very few downsides

Security

Net-security

28.3.19

Algorithms can now find bugs in computer chips before they are made

Security

Net-security

28.3.19

Third-party cyber risk management is a burden on human and financial resources

Security

Net-security

28.3.19

SMBs willing to invest more to protect their businesses

Security

Net-security

28.3.19

Running your Own Passive DNS Service

Security

SANS

27.3.19

VirusTotal Goes Retro with New ASCII Site for Older Browsers

Security

Bleepingcomputer

27.3.19

Build-time security: Block risk and security issues from production rings

Security

Net-security

27.3.19

61% of CIOs believe employees leak data maliciously

Security

Net-security

27.3.19

Does siloed data negatively impact your organization?

Security

Net-security

26.3.19

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Security

Threatpost

26.3.19

Guilty by association: The reality of online retail third-party data leaks

Security

Net-security

26.3.19

Less than 20% of IT pros have complete access to critical data in public clouds

Security

Net-security

26.3.19

Most companies help employees cover costs to obtain professional certifications

Security

Net-security

25.3.19

The success of the digital workplace depends on the practical implementation of new technology

Security

Net-security

23.3.19

D.C. Attorney General Introduces New Data Security Bill

Security

Securityweek

23.3.19

Analysis: Drone Tech Creates New Type of Blended Threat

Security

Threatpost

23.3.19

Introduction to analysing Go binaries

Security

SANS

22.3.19

Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC

Security

Securityweek

22.3.19

Worldwide spending on security solutions expected to continue growing

Security

Net-security

22.3.19

Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

Security

Net-security

21.3.19

Google Fined $1.7 Billion for Anti-Competitive Practices in Online Advertising

Security

Bleepingcomputer

21.3.19

Researchers Use UPnP Protocol to Unmask IPv6 Address

Security

Securityweek

21.3.19

Windows Hello Support Added to Firefox 66

Security

Securityweek

21.3.19

You may trust your users, but can you trust their files?

Security

Net-security

21.3.19

Latest tactics used by cybercriminals to bypass traditional email security

Security

Net-security

20.3.19

Heeere's Clippy! He's Back, but Only for Microsoft Teams.

Security

Bleepingcomputer

20.3.19

Microsoft Edge Insider Closer to Release With New Installers

Security

Bleepingcomputer

20.3.19

Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!

Security

SANS

20.3.19

A network is only as strong as its weakest shard

Security

Net-security

20.3.19

Unsurprisingly, only 14% of companies are compliant with CCPA

Security

Net-security

20.3.19

Nearly half of organizations lack the necessary talent to maintain security measures

Security

Net-security

19.3.19

Old Tech Spills Digital Dirt on Past Owners

Security

Threatpost

19.3.19

Slack Launched Encryption Key Addon For Businesses

Security

Securityaffairs

19.3.19

Google Open Sources Sandboxed API

Security

Securityweek

19.3.19

Slack Introduces Enterprise Key Management Tool

Security

Securityweek

19.3.19

Wireshark 3.0.0 and Npcap: Some Remarks

Security

SANS

19.3.19

The art of securing ERP applications: Protecting your critical business processes

Security

Net-security

19.3.19

Four key security tips when using any collaboration technology

Security

Net-security

19.3.19

The modern threat landscape and expanding CISO challenges

Security

Net-security

19.3.19

Tax season scaries: How to keep your data safe from insider threats

Security

Net-security

18.3.19

Latest trends in automated threat intelligence-driven network security

Security

Net-security

18.3.19

Meet the new generation of white hats

Security

Net-security

17.3.19

Insider Threats Get Mean, Nasty and Very Personal

Security

Threatpost

16.3.19

New Tune Extension Turns Google Chrome Into a Safe Space

Security

Bleepingcomputer

16.3.19

Google Took Down 2.3 Billion Bad Ads in 2018

Security

Securityweek

15.3.19

It is the first time in the history that civic groups hold a protest against a national CERT

Security

Securityaffairs

15.3.19

Torrent Risks: How to get infected through torrent with a good reputation

Security

Securityaffairs

15.3.19

Binary Analysis with Jupyter and Radare2

Security

SANS

15.3.19

90% of consumers value additional security measures to verify mobile-based transactions

Security

Net-security

15.3.19

Thinking of threat intelligence as a contributing member of your security team

Security

Net-security

15.3.19

Is AI really intelligent or are its procedures just averagely successful?

Security

Net-security

14.3.19

Microsoft Edge Insider Addons Store Discovered, 84 Extensions

Security

Bleepingcomputer

14.3.19

Unsecured API Leads to 'Yelp for Conservatives' App Data Leak

Security

Bleepingcomputer

14.3.19

CCleaner Professional Adds Software Updater Feature

Security

Bleepingcomputer

14.3.19

Public-interest technology: Why companies should get involved

Security

Net-security

14.3.19

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

Security

Threatpost

14.3.19

Three Ways DNS is Weaponized and How to Mitigate the Risk

Security

Threatpost

14.3.19

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Security

Thehackernews

14.3.19

Tip: Ghidra & ZIP Files

Security

SANS

14.3.19

Moving from traditional on-premise solutions to cloud-based security

Security

Net-security

13.3.19

Mozilla releases Firefox Send, a free encrypted file transfer service

Security

Net-security

13.3.19

Data management challenges are having a severe impact on profitability

Security

Net-security

12.3.19

Box Enterprise Shared Links Leak Sensitive Information

Security

Securityweek

12.3.19

Ten Principles for a New Approach to Regulating the Internet

Security

Securityweek

12.3.19

Is your company leaking sensitive data via its Box account?

Security

Net-security

12.3.19

Hidden third-party tags could be leaving Fortune 100 companies at risk

Security

Net-security

11.3.19

Webinar – DevSecOps at Hulu: When security and DevOps meet

Security

Net-security

10.3.19

A Comparison Study of SSH Port Activity - TCP 22 & 2222

Security

SANS

8.3.19

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityaffairs

8.3.19

Analysing meterpreter payload with Ghidra

Security

SANS

8.3.19

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityweek

7.3.19

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

Security

Securityweek

7.3.19

Cybersecurity Startup PolySwarm Launches Malware Detection Marketplace

Security

Securityweek

6.3.19

Sale of SSL/TLS certificates on the dark web is rampant

Security

Net-security

6.3.19

Armor Scientific Emerges From Stealth With Wearable Authentication Solution

Security

Securityweek

6.3.19

Users are too confident in their protection from threats

Security

Net-security

5.3.19

Boost Windows 10 Performance with Retpoline Spectre Mitigation

Security

Bleepingcomputer

5.3.19

Security Shifts Left to be Part of Software Development Best Practice: Report

Security

Securityweek

5.3.19

Alphabet's Chronicle Launches Security Telemetry Platform

Security

Securityweek

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

The patterns of elite DevSecOps practices

Security

Net-security

5.3.19

Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Security

Net-security

4.3.19

Microsoft Rolls Out Spectre Variant 2 Mitigations for Windows 10

Security

Securityweek

4.3.19

KnowBe4 Announces New Funding Round at $800 Million Valuation

Security

Securityweek

4.3.19

Cisco Publishes Annual CISO Benchmark Study

Security

Securityweek

4.3.19

RSAC 2019: An Antidote for Tech Gone Wrong

Security

Threatpost

4.3.19

The Wireshark Foundation released Wireshark 3.0.0Security

Securityaffairs

4.3.19

A strong security posture starts with application dependency mapping

Security

Net-security

4.3.19

IT teams are struggling with network infrastructure challenges caused by the cloud

Security

Net-security

4.3.19

Organizations are seeing integration challenges hinder digital transformation initiatives

Security

Net-security

3.3.19

Chrome and Firefox Can Take Screenshots of Sites From the Command Line

Security

Bleepingcomputer

3.3.19

First Hacker Millionaire on HackerOne

Security

Bleepingcomputer

2.3.19

Kaspersky AV Having Certificate Conflicts with Google Chromecast

Security

Bleepingcomputer

2.3.19

Wireshark 3 Released with New Npcap Windows Packet Capturing Driver

Security

Bleepingcomputer

2.3.19

YouTube Disables Comments on Videos with Young Children

Security

Bleepingcomputer

2.3.19

Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech

Security

Bleepingcomputer

2.3.19

Two White Hats Earn Over $1 Million via Bug Bounty Programs

Security

Securityweek

1.3.19

Wireshark 3.0.0 Released

Security

Securityweek

1.3.19

Microsoft Unveils New Azure, Windows Defender ATP Tools

Security

Securityweek

1.3.19

Businesses need to rethink security priorities due to shifting trends

Security

Net-security

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

Mozilla May Reject UAE Firm's Root Inclusion Request

Security

Securityweek

26.2.19

Ad Blocking With Pi Hole

Security

SANS

25.2.19

ICANN calls for wholesale DNSSEC deployment

Security

Net-security

25.2.19

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security

Securityaffairs

25.2.19

New Service From Cisco's Duo Labs Analyzes Chrome Extensions

Security

Securityweek

25.2.19

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security

Securityaffairs

25.2.19

Crooks offer millions to skilled black hats to help them in

Security

Securityaffairs

25.2.19

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Security

Threatpost

23.2.19

Pulse Secure Unveils Software Defined Perimeter Solution

Security

Securityweek

22.2.19

Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On

Security

Bleepingcomputer

22.2.19

Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash

Security

Bleepingcomputer

22.2.19

Should you trust that Chrome extension? Use CRXcavator to decide

Security

Net-security

22.2.19

Exposure of sensitive data via cloud applications and services increases 20%

Security

Net-security

22.2.19

92% of organizations rank users as their primary security concern

Security

Net-security

22.2.19

The risks associated with the influx of unauthorized collaboration tools

Security

Net-security

21.2.19

Google's Nest Hub Has a Microphone It Forgot to Mention

Security

Securityweek

21.2.19

Firms Moving Sensitive Data to Cloud, But Security Still a Problem: Oracle

Security

Securityweek

21.2.19

GitHub Increases Rewards, Scope For Bug-Bounty Program

Security

Threatpost

21.2.19

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

Security

Threatpost

21.2.19

Prevent shadow IT: Companies need security covering multiple communication vectors

Security

Net-security

20.2.19

GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards

Security

Bleepingcomputer

20.2.19

Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

Security

Bleepingcomputer

20.2.19

Armorblox Emerges From Stealth With Natural Language Understanding Platform

Security

Securityweek

20.2.19

GitHub Increases Bug Bounty Program Rewards, Expands ScopeSecurity

Securityweek

20.2.19

Microsoft to Kill Updates for Legacy OS Using SHA-1

Security

Threatpost

20.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Security

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security

Securityaffairs

19.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Security

Net-security

19.2.19

Indicators of poor password hygiene exposed

Security

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Security

Net-security

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS

31.1.19

Skyscanner launches a public bug bounty program

Security

Securityaffairs

31.1.19

The Tricky Balance in Declining or Accepting Online Payments

Security

Securityweek

31.1.19

Taking ethical action in identity: 5 steps for better biometrics

Security

Net-security

31.1.19

Microsoft rolls out new tools for enterprise security and compliance teams

Security

Net-security

31.1.19

Tracking Unexpected DNS Changes

Security

Net-security

30.1.19

Travel Search Website Skyscanner Launches Bug Bounty Program

Security

Securityweek

30.1.19

DNS Providers to Cease Implementing DNS Resolver Workarounds

Security

Securityweek

30.1.19

Mozilla Firefox 65 Ups the Ante on Privacy with Anti-Tracking Efforts

Security

Threatpost

30.1.19

Feds Dismantle Dark Web Credentials Market

Security

Threatpost

30.1.19

Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65

Security

Net-security

30.1.19

Enterprises are struggling with cloud complexity and security

Security

Net-security

29.1.19

Salt Security Emerges From Stealth With API Protection Solution

Security

Securityweek

29.1.19

How to Recover Lost or Deleted Files?

Security

Thehackernews

29.1.19

Boardrooms Are Still Not Singing the Security Song

Security

Securityweek

29.1.19

Aztarna – the open-source scanning tool for vulnerable robots

Security

Securityaffairs

29.1.19

How privacy and security concerns affect password practices

Security

Net-security

29.1.19

What steps consumers need to take to protect themselves online

Security

Net-security

29.1.19

Relaying Exchange?s NTLM authentication to domain admin (and more)

Security

SANS

28.1.19

Misinformation Woes Could Multiply With 'Deepfake' Videos

Security

Securityweek

28.1.19

Microsoft 365 Suffers Massive Two Day Outage, Outlook and Exchange Down

Security

Bleepingcomputer

28.1.19

Google Chrome Adding Support for Signed HTTP Exchanges

Security

Bleepingcomputer

28.1.19

Microsoft To-Do Beta Finally Lets You Attach Files to Tasks

Security

Bleepingcomputer

28.1.19

Resolve to Be More Involved In Your Local Community - REVISITED

Security

SANS

28.1.19

How to know when you’re ready for a fractional CISO

Security

Net-security

28.1.19

How accepting that your network will get hacked will help you develop a plan to recover faster

Security

Net-security

26.1.19

Are you Ready for DNS Flag Day?

Security

SANS

25.1.19

CISSP Price Hike Dismays Certified Security Professionals

Security

Securityweek

25.1.19

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Security

Securityweek

25.1.19

Fighting Fire with Fire: API Automation Risks

Security

Threatpost

25.1.19

The most effective security strategies to guard sensitive information

Security

Net-security

25.1.19

Enterprises turn to MSPs to mitigate huge skills gap concerns

Security

Net-security

24.1.19

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Security

Bleepingcomputer

24.1.19

Millions of PCs Found Running Outdated Versions of Popular Software

Security

Thehackernews

24.1.19

WhiteHat Security Launches New Software Testing Products

Security

Securityweek

24.1.19

Branching out more efficiently and securely with SD-WAN

Security

Net-security

24.1.19

Reimagining risk management to mitigate looming economic dangers

Security

Net-security

23.1.19

Arizona Lawmaker Wants to Tax Porn to Fund Border Security

Security

Bleepingcomputer

23.1.19

Outdated Software Exposes PC Users to Security Risks Says Report

Security

Bleepingcomputer

22.1.19

VLC Responds to Criticism Over Lack of HTTPS for Updates

Security

Securityweek

22.1.19

Business resilience should be a core company strategy, so why are businesses struggling to take action?

Security

Net-security

22.1.19

Agents of disruption: Four testing topics argue the case for agentless security

Security

Net-security

21.1.19

Microsoft launches Azure DevOps bug bounty program

Security

Net-security

21.1.19

Beware the man in the cloud: How to protect against a new breed of cyberattack

Security

Net-security

21.1.19

Machine learning trumps AI for security analysts

Security

Net-security

20.1.19

Mozilla is Adding an Ad Blocker to Firefox Focus 9.0

Security

Bleepingcomputer

19.1.19

PCI SSC Releases New Security Standards for Payment Software

Security

Securityweek

19.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Securityweek

19.1.19

Threatpost News Wrap Podcast For Jan. 18

Security

Threatpost

18.1.19

Microsoft Launches Azure DevOps Bounty Program

Security

Bleepingcomputer

18.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Threatpost

18.1.19

New requirements for the secure design and development of modern payment software

Security

Net-security

17.1.19

I swiped right, Viewing sensitive data cached in your Safari browser.

Security

Securityaffairs

17.1.19

WordPress to Warn on Outdated PHP Versions

Security

Securityweek

15.1.19

Reminder: Microsoft to end support for Windows 7 in 1-year from today

Security

Thehackernews

15.1.19

Mozilla will disable Adobe Flash by default starting from Firefox 69

Security

Securityaffairs

15.1.19

Security Expectations and Mis-Conceptions in Migrating ERP to the Cloud

Security

Securityweek

15.1.19

Firefox 69 to Disable Adobe Flash by Default

Security

Securityweek

15.1.19

43% of businesses are still running Windows 7, security threats remain

Security

Net-security

15.1.19

How to build a better CISO

Security

Net-security

15.1.19

Mozilla Kills Default Support for Adobe Flash in Firefox 69

Security

Threatpost

14.1.19

Mozilla to Disable Flash Plugin by Default in Firefox 69

SecurityBleepingcomputer

14.1.19

Most organizations are migrating data for ERP apps to the cloud

Security

Net-security

13.1.19

US Carriers Promise Again to Stop Selling Customer Location Data

Security

Bleepingcomputer

13.1.19

Microsoft 365 Business Gets Self Service Password Reset Writeback

Security

Bleepingcomputer

12.1.19

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

Security

Threatpost

11.1.19

Google Secures Public DNS Queries With DNS-over-TLS

SecuritySecurityweek

11.1.19

Hyatt Hotels Launches Public Bug Bounty Program

SecuritySecurityweek

11.1.19

There’s a sizable gap between confidence in security programs and their effectiveness

Security

Net-security

11.1.19

Google Search Results Spoofed to Create Fake News

Security

Threatpost

10.1.19

Reddit Users Locked Out of Their Accounts for Unusual Activity

Security

Bleepingcomputer

10.1.19

Google Chrome Ad Blocker Expands Worldwide Starting July 9th

Security

Bleepingcomputer

10.1.19

Google Adds DNS-over-TLS Support to Its Public DNS Service

Security

Bleepingcomputer

10.1.19

Hyatt Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

10.1.19

Google Rolls Out Activity Cards to Help You Find Past Searches

Security

Bleepingcomputer

10.1.19

Microsoft Debuts Azure Migrate and Azure Site Recovery Enhancements

Security

Bleepingcomputer

10.1.19

Microsoft Adding Office 365 Threat Auto-Investigation to GCC Offering

SecurityBleepingcomputer
10.1.19

Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

SecurityThehackernews
10.1.19

Understanding how data becomes intelligence is central for any successful security program

SecurityNet-security
10.1.19

Small manufacturers play important role in supply chain security

SecurityNet-security
10.1.19

G Suite warns admins about domain data exfiltration attempts

SecurityNet-security

9.1.19

Transmute Launches Blockchain Framework Focused on Identity

SecuritySecurityweek

9.1.19

Sophos Acquires Cloud Security Firm Avid Secure

SecuritySecurityweek

9.1.19

gganimate: Animate YouR Security Analysis

Security

SANS

9.1.19

Popular coding advice doesn’t necessarily equal secure coding advice

Security

Net-security

8.1.19

Microsoft told to Pay €1100 After Forced Windows 10 Upgrade Breaks PC

SecurityBleepingcomputer

8.1.19

Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever

SecurityThehackernews

8.1.19

Zerodium offers $2 million for remote iOS jailbreak, $1 million for WhatsApp RCE

Security

Net-security

8.1.19

Akamai Acquires Identity Management Firm Janrain

SecuritySecurityweek

8.1.19

ThreatList: Container Security Lags Amidst DevOps Enthusiasm

Security

Threatpost

7.1.19

US Gadget Love Forecast to Grow Despite Trust IssuesSecuritySecurityweek

7.1.19

Shifting the burden: Long-term magnifying consequence

Security

Net-security

7.1.19

The attack surface is growing faster than it has at any other point in the history of technology

Security

Net-security

7.1.19

Security analytics to reach $12 billion by 2024

Security

Net-security

5.1.19

Weather Channel App in a Deluge of Legal Trouble for Data Misuse

SecurityThreatpost

3.1.19

After 3 years, Google partially fixes a bug in Android Google Chrome

SecuritySecurityaffairs

3.1.19

Microsoft Adds New Microsoft 365 Security and Compliance BundlesSecurityBleepingcomputer

3.1.19

Security Concerns Prompt Closing of Dividend ApplicationsSecuritySecurityweek

3.1.19

Automated System Bypasses Google reCAPTCHA AgainSecuritySecurityweek

3.1.19

New unCaptcha automated system bypasses Google reCAPTCHA once againSecuritySecurityaffairs

2.1.19

wget utility potential leaked password via extended filesystem attributesSecuritySecurityaffairs
31.12.18

French Startup Offers Dark Web Compass, But Not for Everyone

SecuritySecurityweek

30.12.18

‘Snowden Refugee’ Has No Regrets for Helping Whistleblower

Security

Threatpost

30.12.18

Video: De-DOSfuscation Example

Security

SANS

28.12.18

Top 2018 Security and Privacy Stories

Security

Threatpost

22.12.18

Singapore Government Announces Second Bug Bounty Program

SecuritySecurityweek

20.12.18

Microsoft's Windows Sandbox Runs Programs in an Isolated Desktop

Security

Thehackernews

20.12.18

Using OSSEC Active-Response as a DFIR Framework

Security

SANS

20.12.18

An overview of the Attivo Networks solution

Security

Net-security

19.12.18

Untangle Partners With Malwarebytes to Bring Layered Security to SMBs

Security

Securityweek

19.12.18

Oath Paid Out $5 Million in Bug Bounties in 2018

Security

Securityweek

18.12.18

WSJ Webpage Defaced to Support PewDiePie

Security

Threatpost

18.12.18

Automotive Security: It’s More Than Just What’s Under The Hood

Security

Threatpost

18.12.18

New Extortion Email Threatens to Send a Hitman Unless You Pay 4K

SecurityBleepingcomputer

18.12.18

Delivering security and continuity for the cities of tomorrow

Security

Net-security

18.12.18

Automotive Security: It’s More Than Just What’s Under The Hood

Security

Net-security

16.12.18

Which are the worst passwords for 2018?

Security

Securityaffairs

15.12.18

Microsoft Launches AI Malware Prediction Competition with $25K Prize

Security

Bleepingcomputer

15.12.18

123456 Is the Most Used Password for the 5th Year in a Row

Security

Bleepingcomputer

14.12.18

Save the Children Federation Duped in $1M Scam

Security

Net-security

14.12.18

Save the Children Charity Org Scammed for Almost $1 MillionSecurityBleepingcomputer

14.12.18

Arctic Wolf Acquires Risk Assessment Firm RootSecureSecuritySecurityweek

14.12.18

Grammarly Launches Public Bug Bounty Program

Security

Net-security

13.12.18

GitLab Launches Public Bug Bounty Program

Security

Securityweek

13.12.18

Grammarly Launches Public Bug Bounty ProgramSecuritySecurityweek

13.12.18

Deception technology: Authenticity and why it matters

Security

Net-security

12.12.18

Claroty Adds New Capabilities to Industrial Security PlatformSecuritySecurityweek

12.12.18

Hertz, Clear Partner to Speed Rentals With Biometric ScansSecuritySecurityweek

11.12.18

Mozilla Firefox 64.0 Released - Here's What's New

SecurityBleepingcomputer

11.12.18

Biometrics: Security Solution or Issue?

Security

Threatpost

11.12.18

Guide: 5 Steps to Modernize Security in the DevSecOps Era

Security

Net-security

10.12.18

How can businesses get the most out of pentesting?

Security

Net-security

7.12.18

Google Launches Cloud Security Command Center in BetaSecuritySecurityweek

7.12.18

DNA Testing Kits & The Security Risks in Digitized DNASecurityBleepingcomputer

6.12.18

Data Exfiltration in Penetration Tests

Security

SANS

4.12.18

Mozilla to Provide MSI Installers Starting with Firefox 65SecurityBleepingcomputer

4.12.18

Microsoft building Chrome-based browser to replace Edge on Windows 10SecurityThehackernews
3.12.18Mozilla to Provide MSI Installers Starting with Firefox 65SecurityBleepingcomputer
1.12.18MITRE evaluates Enterprise security products using the ATT&CK FrameworkSecuritySecurityaffairs

1.12.18

Mozilla Testing DNS-over-HTTPS in FirefoxSecuritySecurityweek

1.12.18

Bing Warns VLC Media Player Site is ‘Suspicious’ in Likely False-Positive Gaff

Security

Threatpost

30.11.18Mitre Uses ATT&CK Framework to Evaluate Enterprise Security ProductsSecuritySecurityweek
30.11.18Google Makes Secure LDAP Generally AvailableSecuritySecurityweek
30.11.18Mozilla Firefox Expands DNS-over-HTTPS (DoH) Test to Release ChannelSecurityBleepingcomputer

29.11.18

AWS Security Hub Aggregates Alerts From Third-Party ToolsSecuritySecurityweek
29.11.18Knock-Knock Docker!! Will you let me in? Open API Abuse in Docker ContainersSecuritySecurityaffairs

29.11.18

Bing is Warning that the VLC Media Player Site is UnsafeSecurity

Bleepingcomputer

27.11.18

Acceptto Emerges from Stealth with Behavioral Biometric Authentication PlatformSecuritySecurityweek

27.11.18

Researchers Use Smart Bulb for Data ExfiltrationSecuritySecurityweek

27.11.18

Orkus Exits Stealth Mode With Cloud Security PlatformSecuritySecurityweek

23.11.18

ThreatList: One-Third of Firms Say Their Container Security Lags

Security

Threatpost

22.11.18

Zero-Trust Frameworks: Securing the Digital Transformation

Security

Threatpost

22.11.18

Mozilla Overhauls Content Blocking Settings in Firefox 65

Security

Bleepingcomputer

20.11.18Microsoft Enhances Windows Defender ATPSecurityPBWCZ.CZ

17.11.18

Speech Synthesis API Being Restricted in Chrome 71 Due to Abuse

Security

Bleepingcomputer

16.11.18

Firefox Now Shows Warnings On Sites with Data Breaches

Security

Bleepingcomputer
16.11.18GreatHorn Expands Email Security PlatformSecurityPBWCZ.CZ
16.11.18Firefox Alerts Users When Visiting Breached SitesSecurityPBWCZ.CZ
16.11.18Black Friday alertSecurityPBWCZ.CZ

15.11.18

Why you need to know about Penetration Testing and Compliance Audits?

Security

Thehackernews
15.11.18Misconfiguration a Top Security Concern for ContainersSecurityPBWCZ.CZ
15.11.18

Managing the Risk of IT-OT Convergence

Security

Threatpost

13.11.18IT threat evolution Q3 18. StatisticsAnalysis  Cyber  Cryptocurrency  SecurityPBWCZ.CZ
8.11.18World Wide Web Inventor Wants New 'Contract' to Make Web SafeSecurityPBWCZ.CZ
7.11.18Psycho-Analytics Could Aid Insider Threat DetectionSecurityPBWCZ.CZ
2.11.18Google Boosts Account Security With New Tools, ProtectionsSecurityPBWCZ.CZ
2.11.18Law Enforcement Faces Dilemma in Assessing Online ThreatsSecurityPBWCZ.CZ
30.10.18Google Launches reCAPTCHA v3SecurityPBWCZ.CZ
25.10.18Firefox 63 Blocks Tracking CookiesSecurityPBWCZ.CZ
25.10.18Google Blocks New Ad Fraud SchemeSecurityPBWCZ.CZ
24.10.18The Rise of The Virtual Security OfficerSecurityPBWCZ.CZ
24.10.18Mozilla Offers VPN Service to Firefox UsersSecurityPBWCZ.CZ
24.10.18Oracle Adds New Security Services to Cloud PlatformSecurityPBWCZ.CZ
24.10.18Fortinet Tackles Insider Threats with ZoneFox AcquisitionSecurityPBWCZ.CZ
23.10.18Securing the Vote Against Increasing ThreatsSecurityPBWCZ.CZ
18.10.18Tech Giants Concerned About Australia's Encryption LawsSecurityPBWCZ.CZ
14.10.18Purging Long-Forgotten Online Accounts: Worth the Trouble?SecurityPBWCZ.CZ
12.10.18Mozilla Delays Distrust of Symantec CertificatesSecurityPBWCZ.CZ
10.10.18KnowBe4 Brings Artificial Intelligence to Security Awareness TrainingSecurityPBWCZ.CZ
9.10.18How Secure Are Bitcoin Wallets, Really?SecurityPBWCZ.CZ
7.10.18Windows 10 October 18 Update could cause CCleaner stop workingSecurityPBWCZ.CZ
5.10.18Hackers Earn $150,000 in Marine Corps Bug Bounty ProgramSecurityPBWCZ.CZ
5.10.18Wickr Announces General Availability of Anti-Censorship ToolSecurityPBWCZ.CZ
28.9.18Chronicle Unveils VirusTotal EnterpriseSecurityPBWCZ.CZ
25.9.18Microsoft Boosts Azure Security With Array of New ToolsSecurityPBWCZ.CZ
25.9.18Symantec Completes Internal Accounting InvestigationSecurityPBWCZ.CZ
24.9.18Cloudflare Launches Security Service for Tor UsersSecurityPBWCZ.CZ
20.9.18New Tool Helps G Suite Admins Uncover Security ThreatsSecurityPBWCZ.CZ
15.9.18Secureworks Launches New Security Maturity ModelSecurityPBWCZ.CZ
12.9.18OpenSSL 1.1.1 Released With TLS 1.3, Security ImprovementsSecurityPBWCZ.CZ
10.9.18Google Launches Alert Center for G SuiteSecurityPBWCZ.CZ
23.11.18Kaspersky Security Bulletin: Threat Predictions for 2019SecurityPBWCZ.CZ
8.9.18Microsoft to Charge for Windows 7 Security UpdatesSecurityPBWCZ.CZ
7.9.18Fighting Alert Fatigue With Security Orchestration, Automation and ResponseSecurityPBWCZ.CZ
6.9.18Mozilla Appoints New Policy, Security ChiefSecurityPBWCZ.CZ
6.9.18Uber Announces Ramped Up Passenger SecuritySecurityPBWCZ.CZ
4.9.18Arjen Kamphuis, the Dutch associate of Julian Assange, went missing in NorwaySecurityPBWCZ.CZ
24.8.18Oath Pays Over $1 Million in Bug BountiesSecurityPBWCZ.CZ
21.8.18Code of App Security Tool Posted to GitHubSecurityPBWCZ.CZ
17.8.18ESET Launches New Enterprise Security ToolsSecurityPBWCZ.CZ
9.8.18New G Suite Alerts Provide Visibility Into Suspicious User ActivitySecurityPBWCZ.CZ
8.8.18 NERC Names Bill Lawrence as VP, Chief Security OfficerSecurityPBWCZ.CZ
8.8.18Enterprises: Someone on Your Security Team is Likely a Grey Hat HackerSecurityPBWCZ.CZ
8.8.18 New Law May Force Small Businesses to Reveal Data PracticesSecurityPBWCZ.CZ
6.8.18 Mozilla to Researchers: Stay Away From User Data and We Won’t SueSecurityPBWCZ.CZ
5.8.18Do Businesses Know When They’re Using Unethical Data?SecurityPBWCZ.CZ
1.8.18Mozilla Reinforces Commitment to Distrust Symantec CertificatesSecurityPBWCZ.CZ
30.7.18State of Email Security: What Can Stop Email Threats?SecurityPBWCZ.CZ
28.7.18Google Announces New Security Tools for Cloud CustomersSecurityPBWCZ.CZ
26.7.18Chrome Now Marks HTTP Sites as "Not Secure"SecurityPBWCZ.CZ
22.7.18Expert discovered it was possible to delete all projects in the Microsoft Translator HubSecurityPBWCZ.CZ
20.7.18‘IT system issue’ caused cancellation of British Airways cancelled flights at HeathrowSecurityPBWCZ.CZ
19.7.18Microsoft Offers $100,000 in New Identity Bug Bounty ProgramSecurityPBWCZ.CZ
18.7.18Support for Python Packages Added to GitHub Security AlertsSecurityPBWCZ.CZ
18.7.18 Intel Pays $100,000 Bounty for New Spectre VariantsSecurityPBWCZ.CZ
12.7.18Intel pays a $100K bug bounty for the new CPU Spectre 1.1 flawSecurityPBWCZ.CZ
3.7.18Mozilla Announces Root Store Policy UpdateSecurityPBWCZ.CZ
22.6.18Hidden Tunnels: A Favored Tactic to Evade Strong Access ControlsSecurityPBWCZ.CZ
22.6.18Microsoft Combats Bad Passwords With New Azure ToolsSecurityPBWCZ.CZ
22.6.186 Security Flaws in Smart Speakers You Need to Know AboutSecurityPBWCZ.CZ
21.6.18Chronicle launches VirusTotal Monitor to reduce false positivesSecurityPBWCZ.CZ
20.6.18 New VirusTotal Service Aims to Reduce False PositivesSecurityPBWCZ.CZ
8.6.18Google Won't Use Artificial Intelligence for WeaponsSecurityPBWCZ.CZ
8.6.18FIFA public Wi-Fi guide: which host cities have the most secure networks?SecurityPBWCZ.CZ
7.6.18ALTR Emerges From Stealth With Blockchain-Based Data Security SolutionSecurityPBWCZ.CZ
6.6.18Thousands of organizations leak sensitive data via misconfigured Google GroupsSecurityPBWCZ.CZ
31.5.18HTTP Parameter Pollution Leads to reCAPTCHA BypassSecurityPBWCZ.CZ
23.5.18Chinese researchers from Tencent discovered exploitable flaws in several BMW modelsSecurityPBWCZ.CZ
21.5.18Utimaco to Acquire Atalla Hardware Security Module Business From Micro FocusSecurityPBWCZ.CZ