- Security 2019 -

Security  List -  2024  2023  2021  2020  2019  2018


Date

Name

Category

Web

30.12.19

Miscellaneous Updates to our "Threatfeed" API

Security

SANS
29.12.19How to Run Classic and Chromium Microsoft Edge Side-by-SideSecurity

Bleepingcomputer

28.12.19

Mozilla Adds Additional DNS-Over-HTTPS Provider to FirefoxSecurityBleepingcomputer
28.12.19

Enumerating office365 users

Security

SANS

27.12.19

Only 54% of security pros have a written policy on length and randomness for keys for machine identities

Security

Net-security

24.12.19Avast and AVG Firefox Extensions Added Back to Mozilla Addons SiteSecurity

Bleepingcomputer

21.12.19

Vivaldi Now Impersonates Google Chrome to Avoid Being BlockedSecurity

Bleepingcomputer

20.12.19

It’s Time for Your SOC to Level Up

Security

Threatpost

20.12.19

How we developed our simple Harbour decompilerSecuritySecurelist

20.12.19

Unveiling JsOutProx: A New Enterprise Grade ImplantSecuritySecurityaffairs

20.12.19

Massive Errors Found in Facial Recognition Tech: US StudySecurity

Securityweek

20.12.19

Google Promises Upfront Financial Help for Securing Open Source ProjectsSecurity

Securityweek

20.12.19

More DNS over HTTPS: Become One With the Packet. Be the Query. See the Query

Security

SANS

19.12.19Google Offers Financial Support to Open Source Projects for CybersecuritySecurityThehackernews

19.12.19

Reach the next frontier of security automation while maintaining visibility and control

Security

Net-security
18.12.19Fifth Fired Google Worker Files Federal Labor ComplaintSecuritySecurityweek
18.12.19

Worst passwords of 2019: Are you using one of them?

Security

Net-security
18.12.19

What is the actual role of a threat hunter?

Security

Net-security
18.12.19

Download: The Risk Mitigation Handbook for Connected Medical Devices

Security

Net-security

17.12.19

Google to Force OAuth in G Suite to Increase SecuritySecurity

Bleepingcomputer

17.12.19Google to Ban Less Secure Apps in G SuiteSecuritySecurityweek

17.12.19

How Google applies Europe’s Right to Be Forgotten

Security

Net-security

17.12.19

Top enterprise analytics trends for 2020

Security

Net-security

16.12.19

GitLab Paid Half a Million Dollars in Bug Bounties in One YearSecuritySecurityweek
16.12.19Google Now Bans Some Linux Web Browsers From Their ServicesSecurity

Bleepingcomputer

16.12.19

Most DevOps pros feel proper certificate issuance policies slow them down

Security

Net-security
16.12.19

Most security pros admit to accidental internal breaches at their organization

Security

Net-security
15.12.19Google Achieves Its Goal of Erasing the WWW Subdomain From ChromeSecurity

Bleepingcomputer

15.12.19

Gmail Now Lets You Forward Emails as AttachmentsSecurity

Bleepingcomputer

15.12.19“Aw Snap!” Crash Makes a Comeback in Chrome 79Security

Bleepingcomputer

14.12.19

Elegant sLoad Carries Out Spying, Payload Delivery in BITSSecurityThreatpost

14.12.19

GitLab Doles Out Half a Million Bucks to White HatsSecurityThreatpost

13.12.19

Your Smart Christmas Lights Are Safer Than They Were Last YearSecurity

Threatpost

13.12.19

'Waterbear' Employs API Hooking to Hide Malicious BehaviorSecuritySecurityweek

13.12.19

The importance of proactive patch management

Security

Net-security

13.12.19

Will quantum computing overwhelm existing security tech in the near future?

Security

Net-security

13.12.19

As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Security

Net-security

13.12.19

SaaS security fears: Is your data exposed to potential risk?

Security

Net-security
12.12.19Microsoft Security Essentials Will Not Protect Windows 7 PCs After January 14, 2020SecuritySecurityweek

12.12.19

Acronis Acquires 5nine for Its Cloud Management, Security SolutionsSecuritySecurityweek
12.12.19

Active Directory password reset best practices

Security

Net-security
12.12.19

What decentralized IT spending means for the CIO role

Security

Net-security
12.12.19

How identity is addressed by enterprise IT security teams

Security

Net-security

11.12.19

Unpatchable KeyWe smart lock can be easily picked

Security

Net-security

11.12.19

NordVPN announced the launch of a bug bounty programSecuritySecurityaffairs

11.12.19

78% of people forgot a password in the past 90 days

Security

Net-security

11.12.19

Enterprises reaching a security tool tipping point

Security

Net-security

11.12.19

How enterprise risk management programs operate in organizations today

Security

Net-security

11.12.19

Download: 2020 cybersecurity salary survey

Security

Net-security

10.12.19Birth Certificate Data Laid Bare on the Web in Multiple StatesSecurityThreatpost
10.12.19

What are the qualities of a good digital identity management program?

Security

Net-security

10.12.19

BYOD security challenges leave companies at risk

Security

Net-security

10.12.19

Server market revenue declines 6.7% year over year

Security

Net-security

9.12.19

NordVPN Launches Bug Bounty ProgramSecuritySecurityweek

9.12.19

(IN)SECURE Magazine issue 64 released

Security

Net-security

9.12.19SEC Xtractor – Experts released an open-source hardware analysis toolSecuritySecurityaffairs
9.12.19

DNS over HTTPS’ threat to enterprise security

Security

Net-security

9.12.19

Key security priorities for financial services: Preventing fraud and data leaks

Security

Net-security

9.12.19

Most enterprises hit cloud migration problems, still run apps on legacy operating systems

Security

Net-security

9.12.19

Enterprise WLAN market revenue declines year over year

Security

Net-security
8.12.19Disney+ Now Works in Linux After DRM TweakSecurity

Bleepingcomputer

8.12.19

Integrating Pi-hole Logs in ELK with Logstash

Security

SANS
7.12.19Firefox 71 Released with Picture-in-Picture Support and MoreSecurityBleepingcomputer
7.12.19Microsoft Enhances Tracking Prevention in Microsoft Edge 79Security

Bleepingcomputer

7.12.19News Wrap: Authorities Target Evil Corp., Imminent Monitor, Money MulesSecurityThreatpost
6.12.19

Review: Cyber Smart

Security

Net-security

6.12.19

Nearly half of consumers worry about being tricked by fraudsters this holiday season

Security

Net-security

6.12.19

Top compliance and risk management challenges for financial organizations

Security

Net-security

6.12.19

Exploring the proper use of pseudonymisation related to personal data

Security

Net-security

5.12.19Cisco Talos Releases Open Source Dependency Build Automation ToolSecuritySecurityweek
5.12.19

G Suite admins get restricted security code option

Security

Net-security
5.12.19EFF Talks the Corporate Surveillance of ConsumersSecurityThreatpost

5.12.19

‘Highly Competitive’ Buer Loader Emerges in Underground MarketsSecurity

Threatpost

5.12.19ThreatList: 1 in 9 SMBs Believe Nation-State Actors Are Targeting ThemSecurityThreatpost
5.12.19AWS Unveils New Security Services and CapabilitiesSecuritySecurityweek
5.12.19Hacker Accessed Private Reports on HackerOneSecuritySecurityweek
5.12.19Intel Announces Compute Lifecycle Assurance to Protect Platform Supply ChainsSecuritySecurityweek
5.12.19SEC Consult Open Sources Hardware Analysis ToolSecuritySecurityweek
5.12.19

The rise of continuous crowdsourced security testing for compliance

Security

Net-security

5.12.19

2020 predictions: Rising complexity of managing digital risk

Security

Net-security

5.12.19

CPoC: New data security standard for contactless payments

Security

Net-security

5.12.19

How do SMBs plan to improve their security posture in 2020?

Security

Net-security
4.12.19Office 365 To Get Microsoft Recommended Security ProfilesSecurity

Bleepingcomputer

4.12.19

Inside Mastercard's Push for Continuous SecuritySecuritySecurityweek
4.12.19

How DNS filtering works and why businesses need it

Security

Net-security

3.12.19

HelpSystems Acquires UK-based Content Protection Firm ClearswiftSecuritySecurityweek

3.12.19

How are enterprises coping with the security challenges brought on by digital transformation initiatives?

Security

Net-security

3.12.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020SecuritySecurelist

3.12.19

Cybersecurity of connected healthcare 2020: Overview and predictionsSecuritySecurelist
3.12.19Cyberthreats to financial institutions 2020: Overview and predictionsSecuritySecurelist
3.12.195G technology predictions 2020SecuritySecurelist
3.12.19Corporate security prediction 2020SecuritySecurelist

3.12.19

Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds WarnSecurityThreatpost
3.12.19

Webinar: Multi-cloud security

Security

Net-security

2.12.19

Cybercrime Campaign Targeting Hospitality Sector Intensifies

CyberCrime

Securityweek

2.12.19

Insight into NIS Directive sectoral incident response capabilities

Security

Net-security

30.11.19

Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report

Security

Threatpost

29.11.19

ISC Snapshot: Search with SauronEye

Security

SANS

29.11.19

Pain points for CTOs: A primer of the most stressful aspects of the job

Security

Net-security

28.11.19

How can financial institutions prevent shopping season fraud?

Security

Net-security

28.11.19

There’s no way to fill the data skills gap, what now?

Security

Net-security

27.11.19

HP Warns That Some SSD Drives Will Fail at 32,768 Hours of UseSecurity

Bleepingcomputer

27.11.19

Meet Kilos, a New Search Engine for the Dark WebSecuritySecurityweek

27.11.19

Most businesses have yet to allocate a CCPA compliance budget

Security

Net-security

27.11.19

SoniTalk: A new method for near-field communication

Security

Net-security

26.11.19The Hidden Danger in Berners-Lee's Contract for the WebSecuritySecurityweek
26.11.19

Merchants must find ways to balance security with a seamless customer experience

Security

Net-security

25.11.19

My Little DoH Setup

Security

SANS

25.11.19

Developers worry about security, still half of teams lack an expert

Security

Net-security

25.11.19

Data security and automation top IT projects for 2020, AI not a priority

Security

Net-security

23.11.19

Microsoft 365 Experiencing OneDrive and SharePoint OutagesSecurity

Bleepingcomputer

23.11.19

Intel Posts Letter Apologizing for Continued CPU ShortagesSecurity

Bleepingcomputer

23.11.19Google Will Award $1M-Plus to People Who Can Hack Titan M Security ChipSecurity

Threatpost

23.11.19

News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router FlawsSecurity

Threatpost

22.11.19

Arlo: An open source post-election auditing tool

Security

Net-security

22.11.19

Black Friday Alert 2019: Net Shopping Bag of ThreatsSecuritySecurelist

22.11.19

Download: 2019 Security Team Assessment TemplateSecurityThreatpost

22.11.19

Risky behavior exposes consumers to seasonal security scares

Security

Net-security

21.11.19

uBlock Origin Now Blocks Sneaky First-Party Trackers in FirefoxSecurity

Bleepingcomputer

21.11.19

New IBM Cloud Security Solution Combines Data From Existing ToolsSecuritySecurityweek

21.11.19

Hackers Dump 2.2M Gaming, Cryptocurrency Passwords OnlineSecurity

Threatpost

21.11.19

ThreatList: Admin Rights for Third Parties is the NormSecurity

Threatpost

21.11.19

Security Firms, Nonprofits Team to Fight StalkerwareSecurity

Threatpost

21.11.19

Do third-party users follow security best practices and policies?

Security

Net-security

21.11.19

Driving collaboration between security and IT ops teams is a major challenge

Security

Net-security

21.11.19

Cyber risk increases at all layers of the corporate network

Security

Net-security

21.11.19

Podcast – Malcolm, a new tool for network visibility

Security

Net-security

21.11.19

Google introduces new G Suite security options

Security

Net-security

20.11.19

Google Chrome's 'Close Other Tabs' Option Is Back!Security

Bleepingcomputer

20.11.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020SecuritySecurelist

20.11.19

Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Security

Securityweek

20.11.19

Only 11% of organizations can detect intruders in under one minute

Security

Net-security

20.11.19

Template: Assess the performance of your security team

Security

Net-security

19.11.19

Adobe announces end of support for Acrobat 2015 and Adobe Reader 2015SecuritySecurityaffairs

19.11.19

Technology Firms and Victim Advocacy Groups Launch Coalition Against StalkerwareSecurity

Securityweek

19.11.19

Support for Adobe Acrobat, Reader 2015 Will End on April 7, 2020Security

Securityweek

19.11.19

Security of North American Energy Grid Tested in GridEx ExerciseSecurity

Securityweek

19.11.19

Want to build a successful SOC? Here’s what you need to know

Security

Net-security

19.11.19

Review: Foundations of Information Security

Security

Net-security

19.11.19

Managed detection and response: Separating the players from the pretenders

Security

Net-security

18.11.19

Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

Security

Net-security

17.11.19

Brave Urges Congress to Require Ad Blocking Browsers for Govt EmployeesSecurity

Bleepingcomputer

16.11.19

James Clapper: Lessons Learned in a Post-Snowden World

Security

Threatpost

16.11.19

Podcast: Managing an Out-Of-Control Security Tech Stack

Security

Threatpost

15.11.19

GitHub Security Lab aims to make open source software more secure

Security

Net-security

15.11.19

Website, Know Thyself: What Code Are You Serving?

Security

Threatpost

15.11.19

Download: The Comprehensive Compliance Guide

Security

Threatpost

15.11.19

LINE Launches Public Bug Bounty Program on HackerOneSecuritySecurityweek

15.11.19

Online Retailers Ill-Prepared for Holiday SeasonSecuritySecurityweek

15.11.19

Some packet-fu with Zeek (previously known as bro)

Security

SANS

15.11.19

To improve incident response, you need to consider 3rd party solutions

Security

Net-security

15.11.19

IT professionals deem hybrid cloud as most secure

Security

Net-security

15.11.19

Disruptive technology predictions: 2020 will see the creation of completely connected environments

Security

Net-security

14.11.19

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Security

Net-security

14.11.19

Should free internet access be considered as a human right?

Security

Net-security

14.11.19

Download: Internal compliance assessment templates

Security

Net-security

13.11.19

'State of the Firewall' Report: Automation Key to Preventing Costly MisconfigurationsSecuritySecurityweek
13.11.19Insider Threats, a Cybercriminal Favorite, Not Easy to MitigateSecurity

Threatpost

13.11.19U.S. Customs Officers Need 'Reasonable Suspicion' for Searches: JudgeSecuritySecurityweek

12.11.19

ThreatList: Data Breaches Batter Stock Prices at Public Companies, For MonthsSecurity

Threatpost

12.11.19

Enterprise expectations of managed service providers and public cloud providers are shifting

Security

Net-security

12.11.19

Whitepaper: Cybersecurity is improving, but is it enough?

Security

Net-security

11.11.19Hackers Receive $500,000 in One Week via BugcrowdSecuritySecurityweek
11.11.19

When is the right time to red team?

Security

Net-security

11.11.19

Attackers continue to leverage greater levels of social engineering and sophistication

Security

Net-security

10.11.19

Bugcrowd Paid Over $500K in Bug Bounties in One WeekSecurity

Bleepingcomputer

9.11.19

News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine FailsSecurity

Threatpost

8.11.19

Microsoft Apps Diverted from Their Main Use

Security

SANS

8.11.19

SIEM complexity and cloud visibility put companies at risk

Security

Net-security

8.11.19

Global internet freedom declines for the ninth consecutive year

Security

Net-security

8.11.19

Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Security

Net-security

8.11.19

What financial records do companies need to keep, and for how long?

Security

Net-security

7.11.19

Using Light Beams to Control Google, Apple, Amazon AssistantsSecurity

Bleepingcomputer

7.11.19

Chrome, Firefox to Hide Those Annoying Site Notification PromptsSecurity

Bleepingcomputer

7.11.19Gartner Says the Future of Network Security Lies with SASESecurityThehackernews
7.11.19Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust SecuritySecurityThreatpost
7.11.19

Getting the best value out of security assessments

Security

SANS

7.11.19

The promise and peril of post quantum computing

Security

Net-security

7.11.19

Security and risk compliance: Still the most important part of IT strategy

Security

Net-security

6.11.19

New, improved Microsoft 365 security and compliance features

Security

Net-security

6.11.19

Microsoft Announces New Security Capabilities Across PlatformsSecuritySecurityweek

6.11.19

IBM: Face Recognition Tech Should be Regulated, Not BannedSecuritySecurityweek

6.11.19

Defining risk controls that actually work

Security

Net-security

6.11.19

Who is responsible for Active Directory security within your organization?

Security

Net-security

6.11.19

As more companies deploy cloud apps, they must also implement security tools

Security

Net-security

6.11.19

Key predictions that will impact CIOs and IT pros over the next five years

Security

Net-security

5.11.19

Microsoft Unveils New Security Tools for Azure

Security

Securityweek

5.11.19

50% of apps will not be migrated to the cloud

Security

Net-security

5.11.19

Employees know vulnerabilities exist, but they can’t resolve them quickly enough

Security

Net-security

5.11.19

The digital economy is approaching a critical tipping point

Security

Net-security

4.11.19Office 365 to Prevent Malicious Docs From Infecting WindowsSecurity

Bleepingcomputer

4.11.19

Microsoft 365 Helps Improve Orgs’ Security and Compliance PostureSecurity

Bleepingcomputer

4.11.19Microsoft 365 Now Helps Find and Review Insider Security ThreatsSecurity

Bleepingcomputer

4.11.19

Office 365 Breach Detection Capabilities Now in Public PreviewSecurity

Bleepingcomputer

4.11.19First Microsoft Edge Stable Release Candidate Now AvailableSecurity

Bleepingcomputer

4.11.19

Organizations fail to maximize use of Microsoft 365 security features

Security

Net-security

4.11.19

Together, AI and the IoT are having a bigger-than-expected impact

Security

Net-security

4.11.19

Whitepaper: SIEM + Threat Intelligence

Security

Net-security

3.11.19

Remark on EML Attachments

Security

SANS

2.11.19

News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach

Security

Threatpost

1.11.19

Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant

Security

Threatpost

1.11.19

Security services and network security still top spending priorities for CISOs in MENA

Security

Net-security

1.11.19

How has your organization’s risk level changed in the past 12 months?

Security

Net-security

1.11.19

IT teams are embracing intent-based networking, investing in AI technologies

Security

Net-security

31.10.19

NordVPN Plans Security and Privacy Upgrades After HackPrivacy  Security

Bleepingcomputer

31.10.19

Google Adds New Ways For IT Admins to Keep Enterprises SecureSecurity

Bleepingcomputer

31.10.19

Mozilla Provides Workaround for Firefox 70 Not Loading SitesSecurity

Bleepingcomputer

31.10.19

Container usage has grown in complexity, specific security controls are needed

Security

Net-security

31.10.19

Whitepaper: Busting the myth that more threat intel feeds lead to better security

Security

Net-security

31.10.19

G Suite admins get context-aware access controls, rule-based automated actions and alerts

Security

Net-security

30.10.19

Can You Trust Security Vendor Surveys?Security

Securityweek

30.10.19

Examining security process maturity in 400 organizations

Security

Net-security

29.10.19

Generating PCAP Files from YAML

Security

SANS

29.10.19

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance

Security

Net-security

29.10.19

Investigations are an unfortunate fact of life for most corporations

Security

Net-security

28.10.19

Unusual Activity with Double Base64 Encoding

Security

SANS

28.10.19

DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Security

Net-security

28.10.19

New protocol extends Wi-Fi range, can be used with existing hardware

Security

Net-security

28.10.19

Despite enthusiasm for AI adoption, governments are experiencing challenges

Security

Net-security

28.10.19

Whitepaper: Building a Threat Intelligence Programme

Security

Net-security

27.10.19

Office 365 Enables ARC for Enhanced Anti-Spoofing DetectionSecurity

Bleepingcomputer

27.10.19

How To Fix "Aw Snap!" Crash in Google Chrome 78Security

Bleepingcomputer

27.10.19

GitLab Backtracks on Forced Tracking After Negative FeedbackSecurity

Bleepingcomputer

26.10.19

News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown

Security

Threatpost

26.10.19

Ransomware, Mobile Malware Attacks to Surge in 2020

Security

Threatpost

25.10.19

More on DNS Archeology (with PowerShell)

Security

SANS

25.10.19

Palo Alto Networks Blames Tariffs for Firewall Price HikesSecuritySecurityweek
25.10.19

Security pros like their job, yet many struggle with burnout and work-life balance

Security

Net-security
25.10.19

Could lighting your home open up your personal information to hackers?

Security

Net-security
25.10.19

CIO role remains critical in leading enterprises through crises and transformations

Security

Net-security

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance CenterSecurity

Bleepingcomputer

24.10.19

Chrome 78 Released With DoH Trial, Tab Hover Cards, and MoreSecurity

Bleepingcomputer

24.10.19

Firefox 70 Released with In-Browser Data Breach NotificationsSecurity

Bleepingcomputer

24.10.19

Data collectors

Security

Securelist

24.10.19

Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

Security

SANS

24.10.19

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Security

Net-security

24.10.19

Top five tips for building smarter enterprise security

Security

Net-security

24.10.19

Rapid SaaS adoption compounds visibility concerns

Security

Net-security

23.10.19

Chrome 78 Released With DoH, 37 Security PatchesSecuritySecurityweek

23.10.19

Tech, Security Firms Launch Operational Technology Cyber Security AllianceSecuritySecurityweek

23.10.19

Microsoft Invests in Securing Device FirmwareSecuritySecurityweek

23.10.19

Microsoft Launches ElectionGuard Bug Bounty ProgramSecuritySecurityweek

23.10.19

New Azure AD Feature Detects Unauthorized Access AttemptsSecuritySecurityweek

23.10.19

How to remove human error from the cyber risk equation

Security

Net-security

23.10.19

Firefox 70 lets users track online trackers

Security

Net-security

23.10.19

Chance that flaws will ever be dealt with diminishes the longer they stick around

Security

Net-security

23.10.19

Analysts explore the top strategic technology trends for 2020

Security

Net-security

22.10.19

Google Boosts Site Isolation in ChromeSecuritySecurityweek

22.10.19

What's up with TCP 853 (DNS over TLS)?

Security

SANS

22.10.19

Why organizations must arm their SOCs for the future

Security

Net-security

22.10.19

How much organizations are investing in analytics and why

Security

Net-security

22.10.19

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Security

Net-security
22.10.19

Whitepaper: Make smarter decisions by using orchestration with intelligence

Security

Net-security

21.10.19

AI and ML will become important for how organizations run their digital systems

Security

Net-security

21.10.19

Spending on security hardware, software, and services continues to increase

Security

Net-security

21.10.19

Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

Security

Net-security

20.10.19

Microsoft 365 Authentication Outage, Users Unable to Login

Security

Bleepingcomputer

19.10.19

Microsoft Adds Azure AD Sign-In History to Detect Unusual ActivitySecurity

Bleepingcomputer

18.10.19Firefox 70 Address Bar Gets New Security Indicators, Shames Insecure SitesSecurity

Bleepingcomputer

18.10.19Google News Is Experiencing Indexing Issues With New ContentSecurity

Bleepingcomputer

18.10.19Security Health Analytics Helps Secure Google Cloud, Hits BetaSecurity

Bleepingcomputer

18.10.19Under New Ownership, DigiCert Expands into Verified Mark CertificatesSecuritySecurityweek
18.10.19

Six steps for implementing zero trust access

Security

Net-security
18.10.19

Review: The Great Hack

Security

Net-security
18.10.19

Companies are shifting spending to support their critical IT initiatives

SecurityNet-security

17.10.19

Podcast: Departing Employees Could Mean Departing Data

Security

Threatpost

17.10.19

Key challenges impacting IT audit pros navigating an evolving risk landscape

Security

Net-security

17.10.19

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Security

Net-security

17.10.19

Do digital architects have the tools to make the most of transformative technologies?

Security

Net-security

16.10.19

Approaching the Reverse Engineering of a RFID/NFC Vending MachineSecuritySecurityaffairs

16.10.19

Security Monitoring: At Network or Host Level?

Security

SANS

16.10.19

A Deepfake Deep Dive into the Murky World of Digital Imitation

Security

Threatpost

16.10.19

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Security

Threatpost

16.10.19

YARA's XOR Modifier

Security

SANS

16.10.19

Code dependency mapping’s role in securing enterprise software

Security

Net-security

16.10.19

When properly managed, shadow IT can benefit your organization

Security

Net-security

16.10.19

How seriously are businesses taking their PKI security?

Security

Net-security

16.10.19

Download: IR Reporting for Management PPT template

Security

Net-security

15.10.19

Shadow IT Has Benefits Not Yet Fully Utilized by Business

Security

Securityweek

15.10.19

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Security

Securityweek

15.10.19

Google's USB-C Titan Security Key Arrives in the U.S.

Security

Securityweek

15.10.19

Microsoft Office 2010 to Reach End of Support in One YearSecurity

Bleepingcomputer

15.10.19

Product showcase: Alsid for AD

Security

Net-security

15.10.19

AI development has major security, privacy and ethical blind spots

Security

Net-security

15.10.19

Most expect the risk of privileged user abuse to increase

Security

Net-security

14.10.19

A glimpse into the present state of security in robotics

Security

Securelist

14.10.19

5 things security executives need to know about insider threat

Security

Net-security

14.10.19

Researchers may have found a way to trace serial IP hijackers

Security

Net-security

14.10.19

70% of presidential campaigns fail to provide adequate online privacy and security protections

Security

Net-security

14.10.19

Webinar: Securing Web Layer Assets with Cloud WAF

Security

Net-security

13.10.19

YARA v3.11.0 released

Security

SANS

12.10.19

Microsoft Improves Azure Active Directory Security with New RolesSecurity

Bleepingcomputer

11.10.19

Imperva explains how their recent security incident happened

Security

Net-security

11.10.19

DevSecOps role expansion has changed how companies address their security posture

Security

Net-security

10.10.19

Tor Project is going to remove End-Of-Life relays from the networkSecuritySecurityaffairs

10.10.19

Tor to Reject End-of-Life Relays by DefaultSecuritySecurityweek

10.10.19

2FA, HTTPS and private browsing still a mystery to most Americans

Security

Net-security

10.10.19

Pass the Hash Remains a Poorly Defended Threat Vector

Security

Securityweek

10.10.19

Cybersecurity Firms Partner on Open Source Security Technology Development

Security

Securityweek

10.10.19

Only 32% of organizations employ a security-first approach to cloud data storage

Security

Net-security

9.10.19

Researcher Adds $100,000 Worth of Credit to Voi E-Scooter AppSecurity

Bleepingcomputer

9.10.19

Winning the security fight: Tips for organizations and CISOs

Security

Net-security

9.10.19

Intimate Details on Healthcare Workers Exposed as Cloud Security Lags

Security

Threatpost

9.10.19

Digital transformation requires an aggressive approach to security

Security

Net-security

9.10.19

Majority of IT departments leave major holes in their USB drive security

Security

Net-security

8.10.19

Product showcase: Awake Security Network Traffic Analysis Platform

Security

Net-security

8.10.19

Organizations need tools that support DevOps security

Security

Net-security

8.10.19

Report: 2019 eSentire Threat Intelligence Spotlight

Security

Net-security

7.10.19

Cloud-native applications need a unified continuous security approach

Security

Net-security

7.10.19

Insider threats are security’s new reality: Prevention solutions aren’t working

Security

Net-security

7.10.19

The top 10 strategic government technology trends CIOs should plan for

Security

Net-security

6.10.19

visNetwork for Network Data

Security

SANS

4.10.19

'Lost Files' Data Wiper Poses as a Windows Security ScannerSecurity

Bleepingcomputer

4.10.19

Google Chrome to Gradually Start Blocking Mixed Content by DefaultSecurity

Bleepingcomputer

4.10.19

Windows Activator Bundles Banker with C2 in YouTube DescriptionSecurity

Bleepingcomputer

3.10.19

Good cybersecurity comes from focusing on the right things, but what are they?

Security

Net-security

3.10.19

How security programs and breach history influence company valuations

Security

Net-security

3.10.19

Executives have to make cybersecurity a priority in order to secure their business

Security

Net-security

3.10.19

Security and compliance gaps of ineffective employee onboarding and offboarding

Security

Net-security

1.10.19

BlackBerry Launches New Cybersecurity R&D UnitSecuritySecurityweek

1.10.19

Assessing risk: Measuring the health of your infosec environment

Security

Net-security

1.10.19

Managing and monitoring privileged access to cloud ecosystems

Security

Net-security

1.10.19

38% of the Fortune 500 do not have a CISO

Security

Net-security

1.10.19

Tolly report: Evaluating the evolution of network traffic analysis technology

Security

Net-security

30.9.19

Microsoft to block 40+ additional file extensions in Outlook on the web

Security

Net-security

30.9.19

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Security

Securityaffairs

30.9.19

Microsoft will add new file types to the list of blocked ones in Outlook on the Web

Security

Securityaffairs

30.9.19

DevSecOps is emerging as the main methodology for securing cloud-native applications

Security

Net-security

30.9.19

ThreatConnect Platform: Security insight for sound decision-making

Security

Net-security

30.9.19

eBook: The DevOps Roadmap for Security

Security

Net-security

29.9.19

Microsoft Removes CCleaner Ban From Their Community ForumsSecurity

Bleepingcomputer

29.9.19

Driver's License Thefts Spur ADOT to Boost Online SafeguardsSecurity

Securityweek

29.9.19

Microsoft Expands List of Blocked File Types in Outlook on the WebSecurity

Securityweek

28.9.19

Arcane Stealer V Takes Aim at the Low End of the Dark Web

Security

Threatpost

28.9.19

News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware

Security

Threatpost

27.9.19

New Scans for Polycom Autoconfiguration Files

Security

SANS

27.9.19

Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy

Privacy  Security

Threatpost

27.9.19

As consumers engage with insurance companies online, new types of digital fraud emerge

Security

Net-security

27.9.19

The Standoff: Attackers and defenders to face off in digital metropolis security challenge

Security

Net-security

27.9.19

Podcast: Potential problems with the software supply chain for industrial sites

Security

Net-security

25.9.19

What You Need to Know About Next Gen EDRSecurity

Threatpost

25.9.19

60% of Major US Firms Have Been Hacked in Cloud: Study

Security

Securityweek

25.9.19

Microsoft Makes Azure Sentinel Generally Available

Security

Securityweek

25.9.19

How can small companies with limited budgets win at security?

Security

Net-security
25.9.19

Rise of RDP as a target vector

Security

Net-security
25.9.19

99% of misconfiguration incidents in the cloud go unnoticed

Security

Net-security
25.9.19

Security capabilities are lagging behind cloud adoption

Security

Net-security

24.9.19

Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs

Security

SANS

24.9.19

Being CISO Is No Longer a Dead-End Job

Security

Securityweek

24.9.19

CISO role grows in stature, but challenges remain

Security

Net-security

24.9.19

Passwordless authentication is here ​now​, and it is vastly superior to using a password

Security

Net-security

23.9.19

Digital Threats Multiply Ahead of 2020 US ElectionsSecurity

Securityweek

23.9.19

IT vs OT: Challenges and opportunities – podcast

Security

Net-security

23.9.19

YARA XOR Strings: an Update

Security

SANS

23.9.19

How SMBs can bring their security testing on par with larger enterprises

Security

Net-security

23.9.19

Product showcase: NetLib Security Encryptionizer

Security

Net-security

23.9.19

Top challenges for CIOs in a multi-cloud world

Security

Net-security
22.9.19

Wireshark 3.0.5 Release: Potential Windows Crash when Updating

Security

SANS

21.9.19

News Wrap: Emotet’s Return, U.S. Vs. Snowden, Physical Pen Testers ArrestedSecurity

Threatpost

20.9.19

Microsoft Acquires Semmle, GitHub Now a CVE Numbering AuthoritySecurity

Bleepingcomputer

20.9.19HP Acquires Endpoint Security Company BromiumSecuritySecurityweek

20.9.19

Should you trust your smart TV or streaming device?

Security

Net-security

20.9.19

Blacklisting or Whitelisting in the Right Way

Security

SANS
20.9.19Smart TVs, Subscription Services Leak Data to Facebook, GoogleSecurity

Threatpost

20.9.19

Organizations continue to struggle with privacy regulations

Security

Net-security
20.9.19

Key threats and trends SMB IT teams deal with

Security

Net-security
20.9.19

Researchers analyzed 16.4 billion requests to see how bots affect e-commerce

Security

Net-security
20.9.19

Some IT teams move to the cloud without business oversight or direction

Security

Net-security
19.9.19GitHub Becomes CVE Numbering Authority, Acquires SemmleSecuritySecurityweek
19.9.19

The use of open source software in DevOps has become strategic for organizations of all sizes

Security

Net-security

19.9.19

Improving the security, privacy and safety of future connected vehicles

Security

Net-security

18.9.19

Security is slowly becoming essential to doing business

Security

Net-security

18.9.19

What are the most connected countries around the world?

Security

Net-security

17.9.19

Five ways to manage authorization in the cloud

Security

Net-security

17.9.19

Targeted threat intelligence and what your organization might be missing

Security

Net-security

17.9.19

Only 15% of organizations can recover from a severe data loss within an hour

Security

Net-security

16.9.19

Securing the 2020 Elections From Multifarious ThreatsSecuritySecurityweek
16.9.19Tor Raises $86K to Smash BugsSecuritySecurityweek
16.9.19Tor's Bug Bash Fund Raises $86K to Fix Critical IssuesSecurity

Bleepingcomputer

16.9.19

Tor Project’s Bug Smash Fund raises $86K in August

Security

Securityaffairs

16.9.19

CISO do’s and don’ts: Lessons learned

Security

Net-security

16.9.19

Threat visibility is imperative, but it’s even more essential to act

Security

Net-security

16.9.19

Four in five businesses need ways to better secure data without slowing innovation

Security

Net-security

13.9.19

Sandboxie becomes freeware, soon-to-be open source

Security

Net-security

13.9.19

Google Chrome May Let Sites Block Your Screen from Powering DownSecurity

Bleepingcomputer

13.9.19

Virtual Disk Attachments Can Bypass Gmail and Chrome SecuritySecurity

Bleepingcomputer

13.9.19

Attack Traffic Caught by Honeypots Triples Over Six Months

Security

Securityweek

13.9.19

The rise of modern applications, DevSecOps and the intelligence economy

Security

Net-security

13.9.19

Security leaders lack confidence in the supply chain, fear third-party attacks

SecurityNet-security

13.9.19

Interacting with governments in the digital age: What do citizens think?

Security

Net-security

12.9.19

Chrome 77 Released With Removed EV Certificate IndicatorSecurity

Bleepingcomputer

12.9.19Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces CriticismSecurity

Bleepingcomputer

12.9.19

Security holding back employers from meeting employees’ remote working expectations

Security

Net-security

11.9.19

Google to Experiment 'DNS over HTTPS' (DoH) Feature in Chrome 78SecurityThehackernews

11.9.19

Mozilla Launches 'Firefox Private Network' VPN Service as a Browser ExtensionSecurityThehackernews

11.9.19

DNS-over-HTTPS Coming to Chrome 78SecuritySecurityweek

11.9.19

18 Years later, America Vows to 'Never Forget' 9/11SecuritySecurityweek

11.9.19

SD-WAN: Disruptive Technology That Requires Careful Security ConsiderationSecuritySecurityweek

11.9.19

Regulations are driving innovation toward an identity layer on the Internet

Security

Net-security

11.9.19

Fraudsters no longer operate in silos, they are attacking across industries and organizations

Security

Net-security

11.9.19

Download PPT template: Security for Management

Security

Net-security

10.9.19

Microsoft Teams Can Be Used To Execute Arbitrary PayloadsSecurity

Bleepingcomputer

10.9.19

Office 365 ATP Automated Incident Response Now Generally AvailableSecurity

Bleepingcomputer

10.9.19

Office 365 security: Automated incident response based on playbooks

Security

Net-security
10.9.19

More than 99% of cyberattacks rely on human interaction

Security

Net-security

10.9.19

Shine a light on shadow IT to improve organizational resilience

Security

Net-security

10.9.19

70% of educational orgs don’t have an appropriate cloud security budget

Security

Net-security

10.9.19

The use of SOX-specific solutions has more than doubled since last year

Security

Net-security

10.9.19

eBook: A new gold standard for OT security monitoring

Security

Net-security

9.9.19

This is what our summer’s like

Security

Securelist

9.9.19

Cisco Releases GhIDA and Ghidraaas Tools for IDA ProSecuritySecurityweek
9.9.19

SMBs show no improvement in IT maturity levels, security remains top concern

Security

Net-security
9.9.19

Mini eBook: CISSP Practice Tests

Security

Net-security
8.9.19

University, Professional Certification or Direct Experience?

Security

Securityaffairs
8.9.19

Unidentified Scanning Activity

Security

SANS
6.9.19

Business demands have outpaced the ability of IT to deliver services

Security

Net-security

5.9.19

Mozilla Will Support Existing Ad Blockers in Extensions Manifest v3Security

Bleepingcomputer

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Digital transformation success at risk as CIOs struggle to deliver digital projects

Security

Net-security

5.9.19

Organizations focus on fine-tuning systems to ensure compliance while reducing risk

Security

Net-security

4.9.19

FireEye Releases Open Source Persistence Toolkit 'SharPersist'

Security

Securityweek

4.9.19

Zerodium Offers Up to $2.5 Million for Android ExploitsExploit  SecuritySecurityweek

4.9.19

Security pros need more and better visibility into their cloud networks

Security

Net-security

4.9.19

What prevents companies from achieving effective security performance management?

Security

Net-security

4.9.19

How fraud prevention tech can save banks €10M a year

Security

Net-security

4.9.19

Free offering enables any MSP and security integrator to add incident response to their services portfolio

Security

Net-security

3.9.19

Writing Your First Bootloader for Better AnalysesSecuritySecurityaffairs

3.9.19

Cisco Releases Guides for Analyzing Compromised DevicesSecuritySecurityweek
3.9.19

How to reduce the attack surface associated with medical devices

Security

Net-security

3.9.19

Cardholders still dropping the ball when it comes to basic ID theft prevention

Security

Net-security

3.9.19

Quantum computing market revenue to reach $9.1 billion annually by 2030

Security

Net-security

3.9.19

Whitepaper: Security Orchestration with Threat Intelligence

Security

Net-security

1.9.19Reddit Experiencing Outage Due to Amazon AWS IssueSecurity

Bleepingcomputer

1.9.19Microsoft Edge Dev Update Released With New FeaturesSecurity

Bleepingcomputer

1.9.19

Six Hackers Have Now Pocketed $1M From Bug Bounty Programs

Security

Threatpost

30.8.19

Google will pay for data abuse reports related to popular Android apps, Chrome extensions

Security

Net-security
30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security
30.8.19Google Offers Big Bounties for Data Abuse ReportsSecuritySecurityweek
30.8.19

Google Targets Data-Abusing Apps with Bug Bounty Launch

Security

Threatpost

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security
29.8.19Microsoft Lifts Update Block On Windows 7 With Symantec AVSecurity  Vulnerebility

Bleepingcomputer

29.8.19

Knowing what’s on your hybrid-IT environment is fundamental to security

Security

Net-security

29.8.19

What can be done about the rising click interception threat?

Security

Net-security
29.8.19

SOCs still overwhelmed by alert overload, struggle with false-positives

Security

Net-security
28.8.19Google Chrome is Losing the 'Close Other Tabs' OptionSecurity

Bleepingcomputer

28.8.19

Microsoft's Your Phone Is Down, Users Getting Connection ErrorsSecurity

Bleepingcomputer

28.8.19

1 in 4 employees would steal company information to secure their next job

Security

Net-security

27.8.19VMware Unveils Security Enhancements in Virtual Cloud Network OfferingSecuritySecurityweek
27.8.19Nearly Half of SMBs, Enterprises Still Using Windows 7: KasperskySecuritySecurityweek

27.8.19

ThreatList: Half of All Social Media Logins Are FraudSecurity

Threatpost

27.8.19

Growing cloud adoption introduces visibility gaps and security complications

Security

Net-security

27.8.19

A look at the global network access control market

Security

Net-security

26.8.19

The Growing Threat of Deepfake VideosSecuritySecurityweek
26.8.19

How to evaluate a password management solution for business

Security

Net-security

26.8.19

Thinking network-first to protect against security threats

Security

Net-security

26.8.19

Using deep learning and natural language understanding to protect enterprise communication

Security

Net-security

26.8.19

Enterprises are unable to effectively use data to drive decision-making

Security

Net-security

25.8.19

GitHub Experienced Widespread Major Services OutageSecurity

Bleepingcomputer

23.8.19

Google Launches Open-Source Browser Extension for Ad TransparencySecurity

Threatpost

23.8.19

Should you block newly registered domains? Researchers say yes

Security

Net-security

23.8.19

New cross-industry consortium aims to accelerate confidential computing adoption

Security

Net-security

22.8.19

Tech Giants Join Forces on Confidential ComputingSecuritySecurityweek

22.8.19

Amazon, Microsoft, May be Putting World at Risk of Killer AI, Says Report

Security

Securityweek

22.8.19

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses

Security

Net-security

22.8.19

Identifying evasive threats hiding inside the network

Security

Net-security

21.8.19

How to Prepare for Misconfigurations Clouding the Corporate SkiesSecurityThreatpost

21.8.19

New YubiKey 5Ci Has Both USB-C and Lightning ConnectorsSecuritySecurityweek

21.8.19

Three essential elements of a successful Zero Trust cybersecurity program

Security

Net-security

21.8.19

Securing the cloud: Visibility, compliance and vulnerability management

Security

Net-security

21.8.19

Cybersecurity challenges for smart cities: Key issues and top threats

Security

Net-security

20.8.19

With shadow IT running rampant, how can IT keep pace?

Security

Net-security

20.8.19

Automating CCPA compliance: Organize your data and manage requests

Security

Net-security

20.8.19

A point-in-time approach to risk management is no longer effective

Security

Net-security

20.8.19

Most IT pros find red team exercises more effective than blue team testing

Security

Net-security

20.8.19

Adoption of NAS solutions projected to rise steadily in the near future

Security

Net-security

19.8.19

AWS: No Significant Issues at Other Alleged Targets of Capital One HackerSecuritySecurityweek

19.8.19

Red teaming: Why a forward offense is the best defense

Security

Net-security

19.8.19

Deception technology shifts power back to the defender

Security

Net-security

18.8.19

Google Has Started Removing FTP Support From ChromeSecurity

Bleepingcomputer

17.8.19

News Wrap: DejaBlue Bugs and Biometrics Data Breaches

Privacy  Security

Threatpost

17.8.19

Fake News and Influence: Information Warfare in the Digital Age

Security

Threatpost

16.8.19Unique Kaspersky AV User ID Allowed 3rd-Party Web TrackingSecurity

Bleepingcomputer

16.8.19Many Users Don't Change Unsafe Passwords After Being Warned: GoogleSecuritySecurityweek
16.8.19

Biometric data of 1M leaked via an unsecured Suprema owned database

Privacy  Security

Securityaffairs
16.8.19

Millions of Unencrypted Fingerprint and Facial Biometrics Found on Unsecured Database

Privacy  Security

Securityweek

16.8.19

Threat actors are adapting and switching their operations strategically and technically

Security

Net-security

15.8.19Owners of Fake Tech Company Plead Guilty to Fraud ChargesSecuritySecurityweek
15.8.19

Extending security to fourth parties your business needs, but doesn’t control

Security

Net-security

15.8.19

A compendium of container escapes

Security

Net-security

15.8.19

Organizations that scan applications in production have a reduced risk of being breached

Security

Net-security

14.8.19Free MANRS Tool Helps Improve Routing SecuritySecuritySecurityweek
14.8.19

Help Net Security report: SecBI’s automated threat detection, response and hunting

Security

Net-security

12.8.19

McAfee Strengthens Container Security Capabilities With NanoSec Acquisition

Security

Securityweek
12.8.19Beware of Fake Microsoft Account Unusual Sign-in Activity EmailsSecurity

Bleepingcomputer

12.8.19Google Chrome Incognito Mode Can Still Be Detected by These MethodsSecurity

Bleepingcomputer

12.8.19

Nmap Defcon Release: 7.80

SecurityNet-security
12.8.19

Moving away from spreadsheets: How to automate your third-party risk management process

SecurityNet-security
12.8.19

Pitfalls to avoid when improving your software development skills

SecurityNet-security
12.8.19

Kubernetes security matures: Inside the project’s first audit

SecurityNet-security
11.8.19

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Security

Threatpost

10.8.19

Microsoft 365 to Get Enhanced Suspicious Content SubmissionSecurity

Bleepingcomputer

9.8.19

Google Chrome Tests Feature That Gives Any Site a Dark Mode

Security

Bleepingcomputer

9.8.19

Google's Cloud IAP Now Generally Available for Cloud VM Clients

Security

Bleepingcomputer

9.8.19

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

Security

Bleepingcomputer

9.8.19

AT&T Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

9.8.19

Microsoft To Disable VBScript by Default on August 13th

Security

Bleepingcomputer

9.8.19

GM Cruise Releases Automated Firmware Security Analyzer to Open SourceSecuritySecurityweek

9.8.19

Six critical areas to focus on when integrating DevSecOps into an organization

Security

Net-security

8.8.19

AttackSurfaceMapper automates the reconnaissance process

Security

Net-security

8.8.19

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Security

Net-security
8.8.19Microsoft Says It 'Listens' to Conversations Only With PermissionSecurity

Securityweek

8.8.19The Fundamentals of Developing Effective DevSecOpsSecurity

Securityweek

7.8.19

Developer Bypasses Chrome's Anti-Incognito Detection

Security

Securityweek

7.8.19

Slack Unveils New Enterprise Security Tools

Security

Securityweek

6.8.19

Microsoft Invites Researchers to Hack Their Azure Security LabSecurity

Bleepingcomputer

6.8.19

Microsoft Offers Up to $300,000 in New Azure Security LabSecuritySecurityweek

6.8.19

Embracing the cloud and meeting its security demands

Security

Net-security

6.8.19

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security

Net-security

6.8.19

Online skimming: An emerging threat that requires urgent awareness and attention

Security

Net-security

6.8.19

Only 32% of government organizations consider a cloud-first strategy

Security

Net-security

5.8.19

JIRA Misconfiguration Leaks Data of Fortune 500 CompaniesSecuritySecurityweek

5.8.19

Connected Cars Could be a Threat to National Security, Group ClaimsSecuritySecurityweek

5.8.19

There is widespread business confusion and ignorance about the upcoming CCPA regulation

Security

Net-security

5.8.19

Sextortion: Follow the Money - The Final Chapter

Security

SANS

5.8.19

Security orchestration and automation checklist: How to choose the right vendor

Security

Net-security

5.8.19

DNS security is no longer optional

Security

Net-security

5.8.19

FSI organizations are failing to assess their software for security vulnerabilities before release

Security

Net-security

5.8.19

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

Security

Net-security

5.8.19

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

Security

Net-security

5.8.19

Public cloud data continues to grow, headed toward $500 billion by 2023

Security

Net-security

5.8.19

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Security

Net-security

2.8.19

Microsoft Boosts Compromised Account Detection in Azure AD by 100%

Security

Bleepingcomputer

2.8.19

PowerShell Empire Framework Is No Longer Maintained

Security

Bleepingcomputer

2.8.19

Google Chrome Hides WWW and HTTPS:// in the Address Bar Again

Security

Bleepingcomputer

2.8.19

Google Releases Beta of Anomaly Detection for G Suite Customers

Security

Securityweek

2.8.19

Most interesting trends on cloud service and web usage

Security

Net-security

1.8.19

Enterprise Software May Transmit Data Without Your Knowledge

Security

Bleepingcomputer

1.8.19

Outlook Is Down, Users Are Experiencing Sign-in Failures

Security

Bleepingcomputer

1.8.19

Chrome 76 Released With Blocked Flash, Incognito Detection Fix

Security

Bleepingcomputer

1.8.19

Researchers Replace IP Camera Feed With Fake FootageSecuritySecurityweek

1.8.19

Chrome 76 Dumps Default Adobe Flash Player Support

Security

Threatpost

1.8.19

Companies struggle with the slow, unpredictable nature of AI projects

Security

Net-security

31.7.19

Crooks Sell Credentials Using Combolists-as-a-Service ModelSecurity

Bleepingcomputer

31.7.19

Slack Experiencing Large-Scale Outage Caused by Messaging IssueSecurity

Bleepingcomputer

31.7.19

Solving security problems: Security advice for those with limited resources

Security

Net-security

31.7.19

Microsoft Makes Azure Security Center for IoT Generally Available

IoT  Security

Securityweek

31.7.19

Orchestrating security policies across your hybrid cloud with intelligent data virtualization

Security

Net-security

31.7.19

53% of enterprises have no idea if their security tools are working

Security

Net-security

31.7.19

Assessing the efficiency of phishing filters employed by email service providers

Security

Net-security

30.7.19

Security a Top Concern as Containerization Gathers Pace

Security

Securityweek

30.7.19

Whitepaper: Building a Threat Intelligence Programme (UK)

Security

Net-security

30.7.19

How to secure your data as you go digital

Security

Net-security

30.7.19

How effective is your security operations center?

Security

Net-security

29.7.19

Recognizing ZLIB Compression

Security

SANS

29.7.19

Cloud adoption and security are not mutually exclusive

Security

Net-security

29.7.19

The dynamic of modern security challenges: Issues security leaders face today

Security

Net-security

29.7.19

The rise of biometrics and passwordless security

Security

Net-security

29.7.19

How to increase the efficiency of your risk and compliance management strategy

Security

Net-security

29.7.19

SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market

Security

Net-security

28.7.19

Microsoft-Owned GitHub Blocks Devs in US Sanctioned Countries

Security

Bleepingcomputer

28.7.19

A Python TCP proxy

Security

SANS

27.7.19

DVRIP Port 34567 - Uptick

Security

SANS

27.7.19

Microsoft's Office Online Becomes Office After Rebranding

Security

Bleepingcomputer

26.7.19

Tax Professionals Warned by IRS to Create Data Security Plans

Security

Bleepingcomputer

26.7.19

Damaging insider threats rise to new highs in the past year

Security

Net-security

26.7.19

The need for scalable OT security

Security

Net-security

26.7.19

Current methods for anonymizing data leave individuals at risk of being re-identified

Security

Net-security

26.7.19

100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

Security

Net-security

25.7.19

Netography Launches Open Beta of Distributed IPS ServiceSecuritySecurityweek

25.7.19

How to improve the hiring and retaining of infosec professionals?

Security

Net-security

25.7.19

50% of organizations believe attackers can infiltrate their networks each time they try

Security

Net-security

25.7.19

Employees overestimate the efficacy of their workplace’s email security strategy

Security

Net-security

25.7.19

Most SMBs have not identified and documented cybersecurity threats

Security

Net-security

25.7.19

Networking, security and programming training are most in demand

Security

Net-security

24.7.19

Citrix Confirms Password-Spraying Heist of Reams of Internal IP

Security

Threatpost

24.7.19

Tackling the Collaboration Conundrum

Security

Threatpost

24.7.19

May People Be Considered as IOC?

Security

SANS

24.7.19

How AI can improve user experience and security for the finance industry

Security

Net-security

24.7.19

If you’re struggling with Windows 10 migration, updates will be an even bigger challenge

Security

Net-security

23.7.19

Report Finds New Deficiencies in IRS Data Security Security ControlsSecuritySecurityweek

23.7.19

Microsoft to Roll Out Office 365 Licensing Changes in AugustSecurity

Bleepingcomputer

23.7.19

Windows 10 SmartScreen Sends URLs and App Names to MicrosoftSecurity

Bleepingcomputer

23.7.19

Verifying SSL/TLS configuration (part 1)

Security

SANS

23.7.19

Amazon Alexa, Google Home On Collision Course With Regulation

Security

Threatpost

23.7.19

Tricking attackers through the art of deception

Security

Net-security

23.7.19

Security or compliance? Stop choosing between them

Security

Net-security

23.7.19

Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

Security

Net-security

22.7.19

Google increases bounties for Chrome, Google Play bugs

Security

Net-security

22.7.19

IRS Improved Security But Taxpayer Data Is Still At RiskSecurity

Bleepingcomputer

22.7.19

Securing modern web apps: A case for framework-aware SAST

Security

Net-security

22.7.19

Upfront transparency of data use is key for greater consumer acceptance of AI devices

Security

Net-security

22.7.19

How understanding and trust in data informs business decisions

Security

Net-security

21.7.19

Re-evaluating Network Security - It is Increasingly More Complex

Security

SANS

20.7.19

Mozilla Firefox Tor Mode Likely to Start as a Browser AddonSecurity

Bleepingcomputer

19.7.19

Microsoft Launches Bug Bounty Program for Dynamics 365Security

Securityweek

19.7.19

Google Increases Bug Bounty Program RewardsSecuritySecurityweek

19.7.19

Over 8,500 Google Chrome Bug Reports, Larger Rewards in StoreSecurity

Bleepingcomputer

19.7.19

Google Triples Some Bug Bounty PayoutsSecurity

Threatpost

19.7.19

Slack resetting passwords for roughly 1% of its usersSecuritySecurityaffairs

19.7.19

NSS Labs test exposes weaknesses in NGFW products

Security

Net-security

19.7.19

New open source solution reduces the risks associated with cloud deployments

Security

Net-security

19.7.19

Business owners prioritize investment in technology over upskilling

Security

Net-security

18.7.19

Firefox to Warn When Saved Logins are Found in Data BreachesSecurity

Bleepingcomputer

18.7.19

Cracked Tesla 3 Windshield Leads to $10,000 Bug BountySecurityBleepingcomputer

18.7.19

Scraping the TOR for rare contentsSecuritySecurityaffairs

18.7.19

The Other Side of Critical Control 1: 802.1x Wired Network Access Controls

Security

SANS

18.7.19

Anti-Debugging Techniques from a Complex Visual Basic PackerSecuritySecurityaffairs

18.7.19

True passwordless authentication is still quite a while away

Security

Net-security

18.7.19

Skills gap remains a top barrier to SD-WAN adoption

Security

Net-security

18.7.19

Adoption rates of basic cloud security tools and practices still far too low

Security

Net-security

18.7.19

Certificate-related outages impact the reputation of financial services organizations

Security

Net-security

18.7.19

Federal and SLED IT managers say AI will be a game changer

Security

Net-security

18.7.19

Smarter Security’s new optical technology to prevent sidegating

Security

Net-security

18.7.19

Cohesity Runbook enables enterprises to systematically move workloads to the cloud

Security

Net-security

17.7.19

Anti-Debugging Techniques from a Complex Visual Basic Packer

Security

Securityaffairs

17.7.19

Over 80% of network teams play a role in security efforts

Security

Net-security

17.7.19

The importance of hardening firmware security

Security

Net-security

17.7.19

Enterprises catching up with the explosion of cloud use and shadow IT in the workplace

Security

Net-security

16.7.19

Enterprises Showing Increasing Backing of Zero Trust AuthenticationSecurity

Securityweek

16.7.19

Security Teams Often Struggle to Get Developers on Board: GitLab StudySecurity

Securityweek

16.7.19

Firefox About:Compat Feature Shows How it Fixes Per-Site BugsSecurity

Bleepingcomputer

16.7.19

Tesla Awards Researcher $10,000 After Finding XSS VulnerabilitySecurity  Vulnerebility

Securityweek

16.7.19

Avoiding a biometric dystopia

Security

Net-security

16.7.19

The importance of IT asset management within digital transformation processes

Security

Net-security

16.7.19

Yearly hidden costs of managing vendor risk? $3.8 million per healthcare provider

Security

Net-security

16.7.19

How can attackers abuse artificial intelligence?

Security

Net-security

16.7.19

The rise of digital platforms is empowering the military, but challenges remain

Security

Net-security

15.7.19

New Election Systems Use Vulnerable Software

Security

Securityweek

15.7.19

How well are healthcare organizations protecting patient information?

Security

Net-security

15.7.19

CVSS 3.1: Refined and updated for easier adoption by the security community

Security

Net-security

15.7.19

Only 25% of organizations using AI have an enterprise-wide AI strategy

Security

Net-security

12.7.19

Microsoft Edge Canary Now Lets You Block Autoplaying MediaSecurity

Bleepingcomputer

12.7.19

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Security

Threatpost

12.7.19

Human Workers Can Listen to Google Assistant RecordingsSecuritySecurityweek

12.7.19

Mozilla Introduces Grizzly Browser Fuzzing FrameworkSecuritySecurityweek

12.7.19

Mozilla Moves to Deny UAE Firm's Root Inclusion RequestSecuritySecurityweek

12.7.19

Google Home Silently Captures Recordings of Domestic Violence and More

Security

Threatpost

12.7.19

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Security

Threatpost

12.7.19

How businesses can become more nimble and secure by moving to the cloud

Security

Net-security

12.7.19

69% of organizations believe they can’t respond to critical threats without AI

Security

Net-security

11.7.19

Parents’ Guide for Safe YouTube and Internet Streaming for KidsSecuritySecurityaffairs

11.7.19

Prioritizing security efforts is key to data security in the cloud

Security

Net-security

11.7.19

How consumers view the transparency of their AI-enabled interactions

Security

Net-security

10.7.19

Malwarebytes is Now Enforcing Lifetime Licenses to One PCSecurityBleepingcomputer

10.7.19

Mozilla Blocks DarkMatter From Becoming a Trusted CA in FirefoxSecurityBleepingcomputer

10.7.19

Samba Project tells us "What's New" - SMBv1 Disabled by Default (finally)

Security

SANS

10.7.19

Dumping File Contents in Hex (in PowerShell)

Security

SANS

10.7.19

Discovering and fingerprinting BACnet devices

Security

Net-security

10.7.19

The pervasive use of second screens endangers corporate IT networks

Security

Net-security

10.7.19

Do cloud apps make you a target for cyber attacks?

Security

Net-security

10.7.19

Scientists developing self-organizing migration of services with sovereignty over proprietary data

Security

Net-security

10.7.19

Worldwide spending on public cloud services to double by 2023

Security

Net-security

9.7.19

Mozilla Firefox 68 Released With Security and Extension EnhancementsSecurityBleepingcomputer

9.7.19

Solving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS

Security

SANS

9.7.19

Whitepaper: Know your enemy, know your risk

Security

Net-security

9.7.19

Rules-Based Policy Approaches Need to Go

Security

Threatpost

9.7.19

What can financial institutions do to improve email security?

Security

Net-security

9.7.19

Most SMB devices run Windows versions that are expired or will expire by January 2020

Security

Net-security

9.7.19

Are humans ready for AI to take control of digital security?

Security

Net-security

8.7.19

Mozilla Firefox Protection Report to Show Blocked Tracker Stats

Security

Bleepingcomputer

8.7.19

Why identity is the foundation of security

Security

Net-security

8.7.19

Experts weigh in on salient issues around emerging threats and security tech

Security

Net-security

8.7.19

Most organizations plan to adopt new authentication solutions within two years

Security

Net-security

8.7.19

How companies innovate as they face industry disruption

Security

Net-security

6.7.19

Samsung Update App with 10M+ Installs Charges for Free FirmwareSecurity

Bleepingcomputer

6.7.19

Google Chrome to Unload Heavy Ads With Intensive Resource UsageSecurity

Bleepingcomputer

4.7.19D-Link Settles FTC Lawsuit, Promises to Enhance Device SecuritySecurityBleepingcomputer
4.7.19Google AdSense Warns That Chrome to Block Abusive Ads on July 9SecurityBleepingcomputer
4.7.19Certificates Issued to Huawei Subsidiary Found in Cisco SwitchesSecuritySecurityweek
4.7.19Georgia Failed to Subpoena Image of Wiped Elections ServerSecurity

Securityweek

3.7.19

FTC, D-Link Reach Agreement Over Device SecuritySecuritySecurityweek

3.7.19

Firefox finally addressed the Antivirus software TLS ErrorsSecuritySecurityaffairs

3.7.19

Americans Want to Protect Their Information, but Don't Know How: SurveySecuritySecurityweek

3.7.19

Trust dimensions in zero trust security

Security

Net-security

3.7.19

Migrations represent the number one challenge for database professionals

Security

Net-security

3.7.19

To benefit from DevOps implementation, security and dev teams must communicate better

Security

Net-security

3.7.19

Disaster recovery readiness is essential for hybrid and multi-cloud strategies

Security

Net-security

2.7.19

Firefox to Automatically Trust OS-Installed CA Certificates to Prevent TLS ErrorsSecurity

Thehackernews

2.7.19How we hacked our colleague’s smart homeSecuritySecurelist

2.7.19

Firefox Update to Address Antivirus TLS ErrorsSecuritySecurityweek

2.7.19

Finding Beauty In The Architecture

Security

Threatpost

2.7.19

Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

Security

Net-security

2.7.19

To remain competitive, businesses need strategic digital transformation

Security

Net-security

1.7.19

City Council of Somerville bans facial recognition technology

Security

Securityaffairs

1.7.19

Is Your Browser Secure? Here’s How to Secure Your Web Browser Against Attacks!

Security

Securityaffairs

1.7.19

Singapore Government Announces Third Bug Bounty Program

Security

Securityweek

1.7.19

Massachusetts City Bans Facial Recognition Technology

Security

Securityweek

1.7.19

How the healthcare industry can improve online trust

Security

Net-security

1.7.19

Bringing more talented individuals into the security industry

Security

Net-security

1.7.19

What is and what is not working for security operations teams in securing cloud data

Security

Net-security

30.6.19Slack Is Experiencing Worldwide Outage, Degraded PerformanceSecurity

Bleepingcomputer

29.6.19

Track This Demonstrates How Advertisers Track You On The Web

Security

Bleepingcomputer

29.6.19

Google Chrome OS 75 Released with ZombieLoad MDS Mitigations

Security

Bleepingcomputer

28.6.19

Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files

Security

Securityweek

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

Death of the VPN: Enterprise Security Needs New Foundations

Security

Threatpost

28.6.19

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security

Securityaffairs

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

The biggest SecOps burdens hindering progress for enterprises and MSSPs

Security

Net-security

28.6.19

Interoperability and security remain critical factors in any smart city deployment

Security

Net-security

27.6.19

Google Makes DNS Over HTTPS Generally AvailableSecuritySecurityweek

27.6.19

Google Announces DNS over HTTPS ‘General Availability’

Security

Threatpost

27.6.19

Google Allows G Suite Users to Log In With Security CodesSecuritySecurityweek

27.6.19

The Other Side of CIS Critical Control 2 - Inventorying *Unwanted* Software

Security

SANS

27.6.19

Threat actors are doing their homework, researchers identify new impersonation techniques

Security

Net-security

27.6.19

Organizations need greater visibility into network activity

Security

Net-security

27.6.19

Finding skilled pros remains a challenge, cloud and security in high demand

Security

Net-security

26.6.19

AWS Launches Mirroring Feature for Inspecting Network Traffic

Security

Securityweek

26.6.19

Microsoft Adds 2FA-Protected "Personal Vault" Within OneDrive Cloud Storage

Security

Thehackernews

26.6.19

Microsoft OneDrive users get an even more secure Personal Vault

Security

Net-security

26.6.19

Google delivers new G Suite security tools

Security

Net-security

26.6.19

Business Decision Makers Focus on the Wrong Security IssuesSecurity

Bleepingcomputer

26.6.19

Firefox to Use Windows BITS Service for Background UpdatesSecurity

Bleepingcomputer

26.6.19

BGP Route Leak Causes Cloudflare and Amazon AWS ProblemsSecurityBleepingcomputer

26.6.19

AWS Announces General Availability of Security Hub

Security

Securityweek

26.6.19

Review: Specops uReset

Security

Net-security

26.6.19

Cloud security exacerbated by immature security practices

Security

Net-security

26.6.19

Every year, millions of web domains are registered to defraud businesses

Security

Net-security

25.6.19

The Modern-Day Heist: IP Theft Techniques That Enable Attackers

Security

Threatpost

25.6.19

Why businesses need IAM to push their zero trust frameworks forward

Security

Net-security

25.6.19

Emergency Presidential Alerts can be spoofed, researchers warn

Security

Net-security

25.6.19

You don’t just acquire a company, but also its cybersecurity posture

Security

Net-security

25.6.19

How much risk small businesses really pose to supply chain cybersecurity?

Security

Net-security

25.6.19

Most widely adopted digital solutions? Big data, cloud and CRM

Security

Net-security

24.6.19

WeTransfer incident: file transfer emails were sent to unintended email addresses

Security

Securityaffairs

24.6.19

WeTransfer Security Incident: File Transfer Emails Sent to Wrong PeopleSecuritySecurityweek

24.6.19

Beating biometrics: Why biometric authentication alone is not a panacea

Security

Net-security

24.6.19

Which SD-WAN products offer a notable return on investment?

Security

Net-security

24.6.19

Why poor visibility is hampering cybersecurity

Security

Net-security

24.6.19

Only 12% of banks appear to be fully committed to digital transformation

Security

Net-security

23.6.19

Windows Terminal Is Here in It's Multi-Tabbed Console GlorySecurity

Bleepingcomputer

23.6.19

WeTransfer Security Incident Sent Files to the Wrong PeopleSecurity

Bleepingcomputer

20.6.19

Not-so-dear subscribers

Security

Securelist

20.6.19

Are Artificial Intelligence and Machine Learning Just a Temporary Advantage to Defenders?

Security

Securityweek

20.6.19

Open Source Clones Unofficially Sold on the Microsoft Store

Security

Bleepingcomputer

20.6.19

Google Adds Deceptive URL Alerts To Chrome, Unsafe URL Report Add-on

Security

Bleepingcomputer

20.6.19

Microsoft Azure Bastion Preview: Remote VM Access via Azure Portal

Security

Bleepingcomputer

20.6.19

Docker Desktop for Windows 10 Will Soon Switch to WSL 2

Security

Bleepingcomputer

20.6.19

Accidental Cat Filter Makes Politician's Live Stream Hilarious

Security

Bleepingcomputer

20.6.19

How To Secure Your Network: Five Modern Alternatives to VPN

Security

Bleepingcomputer

20.6.19

How to add security to digital transformation processes

Security

Net-security

20.6.19

How can organizations leverage AI technologies to achieve project success?

Security

Net-security

19.6.19

Google Boosts Chrome Protection Against Deceptive Sites

Security

Securityweek

19.6.19

Accenture Acquires Research and Consulting Firm Deja vu SecuritySecurity

Securityweek

19.6.19

Cloudflare Joins the League of EntropySecuritySecurityweek

19.6.19

What You Need To Know About TCP "SACK Panic"

Security

SANS

19.6.19

Google launches Chrome extension for reporting suspicious sites

Security

Net-security

19.6.19

Free Cloudflare Tool Helps CAs Securely Issue Certificates

Security

Securityweek

19.6.19

Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Security

Net-security

19.6.19

Insecure password memory aids: A passwordless future could be the solution

Security

Net-security

19.6.19

Organizations more likely to accelerate business when protecting their cloud data

Security

Net-security

18.6.19Researcher Scrapes and Posts 7 Million Venmo TransactionsSecuritySecurityweek
18.6.19

Economic cycles and disruption are where top CFOs set their firms apart from the competition

Security

Net-security

17.6.19

Google Chrome Canary Flag Makes The Browser a Colorful Mess

Security

Bleepingcomputer

17.6.19

Bella Thorne published her private nude photos before a hacker that was threatening her

Security

Securityaffairs

17.6.19

What does runtime container security really mean?

Security

Net-security

17.6.19

Are U.S. companies overpaying to attract new talent?

Security

Net-security

17.6.19

Appliance upgrades and excessive network latency delaying Office 365 deployments

Security

Net-security

15.6.19New API Changes How Ad Blockers Work in ChromeSecurity

Securityweek

15.6.19

Xenotime threat actor now is targeting Electric Utilities in US and APACSecuritySecurityaffairs

14.6.19

A few Ghidra tips for IDA users, part 4 - function call graphs

Security

SANS

14.6.19

Organizations need capabilities and practices to generate value from AI

Security

Net-security

13.6.19

VIP WordPress Sites Currently Experiencing Availability Issues

Security

Bleepingcomputer

13.6.19

Microsoft Blocks Some Bluetooth Devices Due to Security Risks

Security

Bleepingcomputer

13.6.19

Mozilla Makes Firefox its Own Brand Name, Releases New Logos

Security

Bleepingcomputer

13.6.19

New FormBook Dropper Harbors Obfuscation, Persistence

Security

Threatpost

13.6.19

Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Security

Securityweek

13.6.19

What is "THAT" Address Doing on my Network

Security

SANS

13.6.19

CISO do’s and don’ts for board reporting

Security

Net-security

13.6.19

Healthcare executives need to make cybersecurity a business priority

Security

Net-security

13.6.19

Code signing keys and certificates are crucial security assets, are you protecting them?

Security

Net-security

13.6.19

Personal security and national security concerns are back on the rise

Security

Net-security

13.6.19

Whitepaper: Maturing a Threat Intelligence Program

Security

Net-security

12.6.19

What kids get up to onlineSecurity

Securelist

12.6.19

The Cynet Free Visibility experience: Unmatched insight into IT assets and activities

Security

Net-security

12.6.19

Will self-driving cars represent a new mode for surveillance?

Security

Net-security

11.6.19

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million

Security

Securityweek

11.6.19

Mozilla Confirms Premium Firefox Browser With Security Features

Security

Threatpost

11.6.19

WordPress Sites Worldwide Hit with ‘Call-Girl’ Search-Engine Pollution

Security

Threatpost

11.6.19

Europe’s online economy risks losing €57 billion as SCA is enforced

Security

Net-security

11.6.19

Hackproofing smart meters and boosting smart grid security

Security

Net-security

11.6.19

Analytics and automation solutions to help contact center IT staff ensure compliance

Security

Net-security

11.6.19

Lack of visibility and IT staff availability: The main challenges of enterprise decentralization

Security

Net-security

10.6.19

The Dark Net, a Major Threat but Also a Resource

Security

Securityweek

10.6.19

Sysmon Getting DNS Query Logging with Querying Process Name

Security

Bleepingcomputer

10.6.19

VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program

Security

Bleepingcomputer

10.6.19

Google Chrome 75 Has a Working Tab Hover Card Feature

Security

Bleepingcomputer

10.6.19

Nine Major VPNs Could Get Blocked by Russia in 30 Days

Security

Bleepingcomputer

10.6.19

Critical RCE affects older Diebold Nixdorf ATMs

Security

Securityaffairs

10.6.19

Tip: Sysmon Will Log DNS Queries

Security

SANS

10.6.19

Most e-commerce websites running Magento at high risk of cybercrime

Security

Net-security

10.6.19

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Security

Net-security

9.6.19

Internet Explorer Mode Now Works in Microsoft Edge Dev Builds

Security

Bleepingcomputer

9.6.19

Google Chrome is Getting Closer to Working Tab Groups

Security

Bleepingcomputer

8.6.19

News Wrap: Infosecurity Europe Highlights and BlueKeep Anxiety

Security

Threatpost

8.6.19

Troy Hunt: ‘Messy’ Password Problem Isn’t Getting Better

Security

Threatpost

7.6.19

Chrome 75 Released with 42 Security Fixes and New FeaturesSecurity

Bleepingcomputer

7.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

Security

Threatpost

7.6.19

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security

Securityaffairs

7.6.19

Poor data management can cost organizations $20 million each year

Security

Net-security

7.6.19

Workforce diversity key to plugging the IT skills gap

Security

Net-security

6.6.19

Why Election Trust is Dwindling in a Post-Cambridge Analytica World

Security

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Security

Threatpost

6.6.19

Infosecurity Europe: Easing the Clash Between IT and OT

Security

Threatpost

6.6.19

Getting (proper) value out of security assessments

Security

SANS

6.6.19

Trust nothing: A life in infosec is a life of suspicion

Security

Net-security

6.6.19

An intelligence-driven approach to cyber threats

Security

Net-security

6.6.19

How privileged insiders threaten the security of global organizations

Security

Net-security

6.6.19

Will biometrics replace passwords for online payment authentication?

Security

Net-security

6.6.19

How much do you know about your invisible workforce?

Security

Net-security

5.6.19

Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default

Security

Thehackernews

5.6.19

Embrace chaos to improve cloud infrastructure resilience

Security

Net-security

5.6.19

Unclassified data creates security blind spots for most companies

Security

Net-security

4.6.19

AI Isn’t Good Enough When Lives Are on the Line, Experts Warn

Security

Threatpost

4.6.19

Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders

Security

Net-security

3.6.19

Google is taking action on deceptive installation tactics for Chrome Browser Extensions

Security

Securityaffairs

3.6.19

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security

Securityaffairs

3.6.19

How likely are weaponized cars?

Security

Net-security

3.6.19

Why zero trust is crucial to compliance

Security

Net-security

3.6.19

Cloud migration journey is more complex than anticipated for innovation and efficiency

Security

Net-security

1.6.19

Google Targeting Deceptive Install Tactics for Chrome Extensions

Security

Bleepingcomputer

1.6.19

Gmail's Confidential Mode for G Suite Goes Live on June 25

Security

Bleepingcomputer

1.6.19

Google to Allow webRequest Ad Blocking for Enterprise Deployments

Security

Bleepingcomputer

1.6.19

Microsoft Boosts Shadow IT Discovery for Cloud Security

Security

Bleepingcomputer

1.6.19

Chrome Extensions Policy Hits Deceptive Installation Tactics

Security

Securityweek

1.6.19

Public Exposure of Sensitive Files on the Internet is Getting Worse

Security

Securityweek

31.5.19

Gen Z Interns and Social Media: A Perfect Security Storm

Security

Threatpost

31.5.19

Retrieving Second Stage Payload with Ncat

Security

SANS

31.5.19

Amazon Digital Assistant Alexa Gets New Skill: Amnesia

Security

Securityweek

30.5.19

G Suite to get Gmail confidential mode, on by default

Security

Net-security

30.5.19

Using Public Wi-Fi? Your data can be hacked easily! Here’s How…

Security

Securityaffairs

30.5.19

Majority of CISOs plan to ask for an increase in cybersecurity investment

Security

Net-security

30.5.19

Security overconfidence and immaturity continue to endanger organizations

Security

Net-security

30.5.19

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Security

Net-security

29.5.19

Structural integrity: Quantifying risk with security measurement

Security

Net-security

29.5.19

SD-WAN alone cannot address the networking challenges of digital business

Security

Net-security

28.5.19

GitHub introduces Dependabot-powered automated security fixes

Security

Net-security

28.5.19

nmap Service Fingerprint

Security

SANS

28.5.19

Handle personal data: What we forget is as important as what we remember

Security

Net-security

28.5.19

How to diminish the great threat of legacy apps

Security

Net-security

28.5.19

Volume and quality of training data are the largest barriers to applying machine learning

Security

Net-security

27.5.19

Sectigo says that most of certificates reported by Chronicle analysis were already revoked

Security

Securityaffairs

27.5.19

Video: nmap Service Detection Customization

Security

SANS

26.5.19

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Security

Bleepingcomputer

26.5.19

Firefox 67 Switching to Empty Profiles Causing Data Loss Fears

Security

Bleepingcomputer

26.5.19

Microsoft Pulls Edge Dev Update After Browser Launch Issues

Security

Bleepingcomputer

26.5.19

Google Tracks Purchases For Paying G Suite Users, Doesn’t Show It

Security

Bleepingcomputer

26.5.19

You're Not At Fault, Google Search Tripped and Broke Its Index

Security

Bleepingcomputer

25.5.19

GitHub introduces new tools and security features to secure code

Security

Securityaffairs

25.5.19

GitHub Adds New Tools to Help Developers Secure Code

Security

Securityweek

25.5.19

Goodbye Passwords: Hello Identity Management

Security

Threatpost

24.5.19

Amazon Shareholders Support Selling Face Recognition Tech to Police

Security

Securityweek

24.5.19

Investigating an Odd DNS Query

Security

SANS

24.5.19

Solving the network visibility problem with NaaS

Security

Net-security

24.5.19

Most security pros have considered quitting due to a lack of resources

Security

Net-security

24.5.19

Companies increasingly investing in container adoption, security remains an issue

Security

Net-security

24.5.19

How small businesses can keep their data secure

Security

Net-security

22.5.19

Google has been storing unhashed G Suite customer passwords

Security

Net-security

22.5.19

Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005

Security

Securityweek

22.5.19

Poor Security Hygiene Found Across Almost All Political Parties in US, Europe

Security

Securityweek

22.5.19

Awareness Training Firm KnowBe4 Acquires Awareness Measurement Firm CLTRe

Security

Securityweek

22.5.19

Google Stored Unhashed G Suite Passwords for Over a Decade

Security

Bleepingcomputer

22.5.19

Microsoft Releases Windows 10 Version 1903 - May 2019 Update

Security

Bleepingcomputer

22.5.19

Core Elastic Stack Security Features Now Available For Free Users As WellSecurityThehackernews

22.5.19

The security challenges of managing complex cloud environments

Security

Net-security

22.5.19

Organizations face operational deficiencies as they deal with hybrid IT complexities

Security

Net-security

21.5.19

Defiant Tech firm who operated LeakedSource pleads guilty

Security

Securityaffairs

21.5.19

Salesforce Woes Linger as Admins Clean Up After Service Outage

Security

Threatpost

21.5.19

Using Shodan Monitoring

Security

SANS

21.5.19

Five ways automating IAM saves you money

Security

Net-security

21.5.19

How effective are login challenges at preventing Google account takeovers?

Security

Net-security

21.5.19

Traditional approach to data security hindering digital transformation initiatives

Security

Net-security

21.5.19

SD-WAN adoption growing as enterprises embrace app-centric architecture transition

Security

Net-security

21.5.19

Engineering teams are struggling because they’re missing the right automation

Security

Net-security

21.5.19

ThreatQ adds support for mobile and PRE-ATT&CK in response to rapid customer adoption

Security

Net-security

20.5.19

Group Seeks Investigation of Deep Packet Inspection Use by ISPs

Security

Securityweek

20.5.19

Salesforce faced one of its biggest service disruption of ever

Security

Securityaffairs

20.5.19

On the path to Zero Trust security: Time to get started

Security

Net-security

16.5.19

Over 757K Fraudulently Obtained IPv4 Addresses Revoked by ARIN

Security

Bleepingcomputer

16.5.19

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Security

Securityaffairs

16.5.19

Identity theft victims could lead us to accept more security-improving friction

Security

Net-security

16.5.19

CISOs: What would you do over?

Security

Net-security

16.5.19

When all else fails, organizations realize they must share threat intel

Security

Net-security

15.5.19

What does it take to be an infosec product strategist?

Security

Net-security

15.5.19

Cynet: An Autonomous Security Platform for Any Size Organization

Security

Threatpost

15.5.19

Security spring cleaning: 5 tips for tidying up network safeguards

Security

Net-security

15.5.19

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Security

Net-security

15.5.19

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Security

Net-security

15.5.19

Employees are aware of USB drive security risks, but don’t follow best practices

Security

Net-security

14.5.19

Linksys Smart Wi-Fi Routers Leak Info of Connected Devices

Security

Bleepingcomputer

14.5.19

GAO Makes Recommendations to Improve Security of Taxpayer Data

Security

Securityweek

14.5.19

Prioritizing risks in a climate of geopolitical threats

Security

Net-security

13.5.19

Blocking Hyperlink Auditing Tracking Pings with Extensions

Security

Bleepingcomputer

13.5.19

What CISOs should focus on when deciding on a strategy

Security

Net-security

13.5.19

Despite warnings, most people still don’t change their passwords

Security

Net-security

13.5.19

As IT companies approach digital transformation, key issues remain a struggle

Security

Net-security

10.5.19

Symantec CEO Quits Unexpectedly, Stock Sinks After Missing Estimates

Security

Securityweek

10.5.19

Mozilla to Delete Usage Data Collected From Firefox Addon Fix

Security

Bleepingcomputer

10.5.19

Firefox May Add Some Tor Features for Super Private Browsing Mode

Security

Bleepingcomputer

10.5.19

Orange signs an agreement for the acquisition of 100% of SecureLink

Security

Net-security

9.5.19

IT Specialist Convicted on Cyber Hacking Charges Sentenced

Security

Securityweek

9.5.19

Microsoft Edge Beta Downloads Leaked, Based on Chromium 75

Security

Bleepingcomputer

9.5.19

Microsoft Announces Enhanced Enterprise BitLocker Management

Security

Bleepingcomputer

9.5.19

Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera

Security

Threatpost

9.5.19

WordPress 5.2 Brings New Security Features

Security

Securityweek

9.5.19

Securing satellites: The new space race

Security

Net-security

9.5.19

Whose (usage) data is it, anyway?

Security

Net-security

9.5.19

How institutions, advisors, and investors think about digital assets

Security

Net-security

8.5.19

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

Security

Thehackernews

8.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Security

Threatpost

8.5.19

Top 5 Configuration Mistakes That Create Field Days for Hackers

Security

Threatpost

8.5.19

WordPress updates are digitally signed at last!

Security

Net-security

8.5.19

Researcher Finds CSS-Only Method to Track Mouse Movements

Security

Bleepingcomputer

8.5.19

Google Chrome To Stop Sites From Messing with the Back Button

Security

Bleepingcomputer

8.5.19

Tor Browser 8.0.9 Released to Fix Disabled NoScript Addon

Security

Bleepingcomputer

8.5.19

Microsoft Launches New Solutions to Protect Elections From Hacking

Security

Securityweek

8.5.19

Email roulette, May 2019

Security

SANS

8.5.19

Executing a multi-cloud strategy: Crawl, walk, run

Security

Net-security

8.5.19

Open banking establishes new access to banks’ networks, creating additional security issues

Security

Net-security

8.5.19

Senior payment executives’ thoughts on SME PCI compliance and security

Security

Net-security

7.5.19

ATMitch: New Evidence Spotted In The Wild

Security

Securityaffairs

7.5.19

Privileged Access Management Solutions Are Shifting to the Cloud: Survey

Security

Securityweek

7.5.19

Amazon to Disable S3 Path-Style Access Used to Bypass Censorship

Security

Bleepingcomputer

7.5.19

Microsoft Launches Multi-Shell Windows Terminal Console App

Security

Bleepingcomputer

7.5.19

Upcoming Microsoft Edge Features Announced at Build 2019

Security

Bleepingcomputer

7.5.19

Google Announces Fourth-Annual Capture the Flag Event

Security

Securityweek

7.5.19

Tor Security Add-On Abruptly Killed by Mozilla Bug

Security

Threatpost

7.5.19

Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting

Security

Threatpost

7.5.19

Text and Text

Security

SANS

7.5.19

Unhackable? New chip makes the computer an unsolvable puzzle

Security

Net-security

6.5.19

Firefox 66.0.4 Released With Fix for Disabled Addons

Security

Bleepingcomputer

6.5.19

NoScript temporarily disabled in Tor Browser … how to fix it?

Security

Securityaffairs

6.5.19

PSD2 and strong customer authentication: Are all elements equal?

Security

Net-security

5.5.19

Mozilla plans to ban Firefox Extensions containing obfuscated code

Security

Securityaffairs

4.5.19

Firefox Addons Being Disabled Due to an Expired Certificate

Security

Bleepingcomputer

4.5.19

Mozilla Bans Firefox Extensions Containing Obfuscated Code

Security

Securityweek

3.5.19

Chrome Will Allow Sites to Check Your OS Dark Mode Settings

Security

Bleepingcomputer

3.5.19

Mozilla To Disable Firefox Add-Ons with Obfuscated Code

Security

Bleepingcomputer

3.5.19

Mozilla will block Firefox add-ons that contain obfuscated code

Security

Net-security

3.5.19

Ladders, SkyMed Leak Employment, Medical Data for Millions

Security

Threatpost

3.5.19

Consumers care deeply about their privacy, security, and how their personal information is handled

Security

Net-security

2.5.19

Windows 10 Security Feature Slows Launching of Large Programs

Security

Bleepingcomputer

2.5.19

Open source security: The risk issue is unpatched software, not open source use

Security

Net-security

2.5.19

Only 55% of companies plan to be ready for CCPA implementation

Security

Net-security

2.5.19

Consumers increasingly deploying biometrics as PINs and passwords continue to fail

Security

Net-security

1.5.19

Microsoft Expands Security and Compliance Features for 365 Customers

Security

Securityweek

1.5.19

Local Credit Union Sues Fiserv Over 'Amateurish Security Lapses'

Security

Securityweek

1.5.19

Introduction to KAPE

Security

SANS

1.5.19

As organizations continue to adopt multicloud strategies, security remains an issue

Security

Net-security

1.5.19

Security and compliance obstacles among the top challenges for cloud native adoption

Security

Net-security

30.4.19

Windows Security Update Caused Recent Antivirus Conflicts and Freezes

Security

Bleepingcomputer

30.4.19

Making the most of threat intelligence with threat intelligence gateways

Security

Net-security

29.4.19

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Security

Securityaffairs

29.4.19

GE trade secret theft case demonstrates need for document behavior monitoring

Security

Net-security

27.4.19

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Security

Threatpost

27.4.19

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Security

Threatpost

27.4.19

Microsoft Removes Password-Expiration Policy in Windows 10

Security

Securityweek

26.4.19

NIST Tool Finds Errors in Complex Safety-Critical Software

Security

Securityweek

26.4.19

The strengths and weaknesses of different VPN protocols

Security

Securityaffairs

26.4.19

Service Accounts Redux - Collecting Service Accounts with PowerShell

Security

SANS

26.4.19

Best practices when implementing SD-WAN

Security

Net-security

26.4.19

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Security

Net-security

26.4.19

Global spending on digital transformation to reach $1.18 trillion in 2019

Security

Net-security

26.4.19

Established companies leveraging fintech capabilities for growth

Security

Net-security

25.4.19

Facial Recognition is Here: But Are We Ready?

Security

Threatpost

25.4.19

Poll: Are You Creeped Out by Facial Recognition?

Security

Threatpost

25.4.19

You can’t fix what you can’t see: A new way of looking at network performance

Security

Net-security

25.4.19

Researchers develop new tool for safety-critical software testing

Security

Net-security

25.4.19

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

Security

Net-security

24.4.19

Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators

Security

SANS

24.4.19

A casual approach to workplace communications presents major security risks

Security

Net-security

23.4.19

Whitepaper: Third-Party Risk to the Nth Degree

Security

Net-security

23.4.19

Windows April Updates Also Have Problems with McAfee Software

Security

Bleepingcomputer

23.4.19

Microsoft Windows Defender ATP APIs Now Generally Available

Security

Bleepingcomputer

23.4.19

Windows 7 Now Showing End of Support Warnings

Security

Bleepingcomputer

23.4.19

The foundation: Quantifying risk with focused security measurement

Security

Net-security

23.4.19

Scientists may have identified a new way to improve network security

Security

Net-security

20.4.19

Avast, Avira, Sophos and other antivirus solutions show problems after

Security

Securityaffairs

20.4.19

Mozilla Firefox to Enable Hyperlink Ping Tracking By Default

Security

Bleepingcomputer

20.4.19

The New Microsoft Edge Sometimes Impersonates Other Browsers

Security

Bleepingcomputer

20.4.19

Google to Block Logins from Embedded Browser Frameworks

Security

Bleepingcomputer

20.4.19

Windows 10 Application Guard Added to the New Microsoft Edge

Security

Bleepingcomputer

19.4.19

UK Announces Introduction of Online Pornography Age Checks in July

Security

Bleepingcomputer

19.4.19

Mysterious Operative Haunted Kaspersky Critics

Security

Securityweek

19.4.19

Fortinet Settles Whistleblower Case for $545,000

Security

Securityweek

19.4.19

DevSecOps: Fast development without sacrificing safety

Security

Net-security

19.4.19

Google will check apps by new developers more thoroughly

Security

Net-security

19.4.19

Building a modern data registry: Go beyond data classification

Security

Net-security

19.4.19

The biggest hurdles to digital transformation initiatives? Budget and top-down support

Security

Net-security

18.4.19

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

Security

Net-security

18.4.19

One hundred percent of endpoint security tools eventually fail

Security

Net-security

18.4.19

The perimeter is vanishing, how will you secure your network?

Security

Net-security

18.4.19

Consumers willing to adopt smart payments but companies need to guarantee security

Security

Net-security

18.4.19

Attention CISOs: Five steps to get the security funding you need

Security

Net-security

17.4.19

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Security

Securityaffairs

17.4.19

Banks continue to prioritize risk management over customer convenience

Security

Net-security

16.4.19

Open Source Tool From FireEye Automates Analysis of Flash Files

Security

Securityweek

16.4.19

Odd DNS Requests that are Normal

Security

SANS

16.4.19

Bad security hygiene still a major risk for enterprise IT networks

Security

Net-security

16.4.19

As IT security automation increases, so does the need for highly skilled staff

Security

Net-security

16.4.19

What is driving organizations’ cloud adoption?

Security

Net-security

15.4.19

Google introduces many G Suite security enhancements

Security

Net-security

15.4.19

The top emerging risks organizations are facing

Security

Net-security

13.4.19

Bill Introduced to Protect the Privacy Rights of Americans

Security

Bleepingcomputer

12.4.19

VPN apps insecurely store session cookies in memory and log files

Security

Securityaffairs

12.4.19

Microsoft Introduces Security Configuration Framework

Security

Securityweek

12.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

12.4.19

Enterprise VPN apps store authentication and session cookies insecurely

Security

Net-security

12.4.19

Threat Group Uses Pastebin, GitHub In SneakyPastes Operation

Security

Bleepingcomputer

12.4.19

Google Wants To Block Potentially Risky Non-Secure Downloads

Security

Bleepingcomputer

12.4.19

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Security

Securityweek

12.4.19

Many New Security Features, Services Added to Google Cloud

Security

Securityweek

12.4.19

How password-less security benefits helpdesks

Security

Net-security

11.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

11.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

11.4.19

Vendor risk management programs are running harder just to stay in place

Security

Net-security

11.4.19

Finance knocks business and professional services off top spot in four most attacked industries

Security

Net-security

11.4.19

Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

Security

Net-security

10.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

10.4.19

Czech Court: Rights of Alleged Russian Hacker Violated

Security

Securityweek

9.4.19

Is your organization getting physical security right?

Security

Net-security

9.4.19

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Security

Net-security

8.4.19

Perimeter solutions: Do layers of security make a difference?

Security

Net-security

8.4.19

CIOs and CISOs hold off on crucial updates due to potential impact on business operations

Security

Net-security

8.4.19

The unique business-critical threats facing converged IT-OT systems

Security

Net-security

8.4.19

Scaling innovation is critical for digital transformation success, but clearly presents a challenge

Security

Net-security

6.4.19

Google Adding Chrome Admin Policy to Uninstall Blacklisted Extensions

Security

Bleepingcomputer

6.4.19

Beagle: Graph transforms for DFIR data & logs

Security

SANS

5.4.19

Study Shows Screen Time Before Bed Is Not Bad For Teenagers

Security

Bleepingcomputer

5.4.19

Only 12% of enterprises are consistently able to detect insider threats

Security

Net-security

5.4.19

What is shadow mining and why is it a security threat?

Security

Net-security

5.4.19

85% of organizations fail to meet even basic PAM security hygiene

Security

Net-security

5.4.19

Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Security

Net-security

4.4.19

Free Cynet Threat Assessment for Mid-sized and Large Organizations

Security

Threatpost

4.4.19

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Security

Thehackernews

4.4.19

New Waves of Scans Detected by an Old Rule

Security

SANS

4.4.19

Microsoft rolls out new security capabilities for Azure customers

Security

Net-security

4.4.19

Microsoft Paid $2,000,000 in Bounty Rewards in 2018

Security

Securityweek

4.4.19

The security challenges that come with serverless computing

Security

Net-security

3.4.19

Chromium-Based Microsoft Edge Added to Windows 10 Sandbox

Security

Bleepingcomputer

3.4.19

U.S. Airlines Cancel, Delay Flights Because of Aerodata Outage

Security

Bleepingcomputer

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

Security

Bleepingcomputer

3.4.19

To DevSecOps or not to DevSecOps?

Security

Net-security

3.4.19

Digital transformation goes hand-in-hand with Zero Trust security

Security

Net-security

2.4.19

Game of Threats

Security

Securelist

2.4.19

Security Policy Management Firm Tufin Sets Terms for IPO

Security

Securityweek

2.4.19

The CIO’s greatest roadblock to Agile development: Security governance

Security

Net-security

2.4.19

90% of companies interested in crowdsourced security programs

Security

Net-security

2.4.19

Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation

Security

Net-security

2.4.19

45% of taxpayers do not securely store tax documents

Security

Net-security

1.4.19

Intel VISA Tech Can Be Abused, Researchers Allege

Security

Threatpost

1.4.19

Analysis of PDFs Created with OpenOffice/LibreOffice

Security

SANS

1.4.19

How to Marie Kondo your data

Security

Net-security

1.4.19

Nearly all consumers are backing up their computers, but data loss is here to stay

Security

Net-security

30.3.19

Commando VM – Using Windows for pen testing and red teaming

Security

Securityaffairs

29.3.19

New Shodan Monitor service allows tracking Internet-Exposed devicesSecurity

Securityaffairs

29.3.19

Vigilantes Counter Christchurch Manifesto with Weaponized Version

Security

Bleepingcomputer

29.3.19

Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

Security

Net-security

29.3.19

CIOs admit certificate-related outages routinely impact critical business applications and services

Security

Net-security

28.3.19

New Shodan Service Keeps Track of Internet-Exposed Systems

Security

Securityweek

28.3.19

When it comes to file sharing, the cloud has very few downsides

Security

Net-security

28.3.19

Algorithms can now find bugs in computer chips before they are made

Security

Net-security

28.3.19

Third-party cyber risk management is a burden on human and financial resources

Security

Net-security

28.3.19

SMBs willing to invest more to protect their businesses

Security

Net-security

28.3.19

Running your Own Passive DNS Service

Security

SANS

27.3.19

VirusTotal Goes Retro with New ASCII Site for Older Browsers

Security

Bleepingcomputer

27.3.19

Build-time security: Block risk and security issues from production rings

Security

Net-security

27.3.19

61% of CIOs believe employees leak data maliciously

Security

Net-security

27.3.19

Does siloed data negatively impact your organization?

Security

Net-security

26.3.19

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Security

Threatpost

26.3.19

Guilty by association: The reality of online retail third-party data leaks

Security

Net-security

26.3.19

Less than 20% of IT pros have complete access to critical data in public clouds

Security

Net-security

26.3.19

Most companies help employees cover costs to obtain professional certifications

Security

Net-security

25.3.19

The success of the digital workplace depends on the practical implementation of new technology

Security

Net-security

23.3.19

D.C. Attorney General Introduces New Data Security Bill

Security

Securityweek

23.3.19

Analysis: Drone Tech Creates New Type of Blended Threat

Security

Threatpost

23.3.19

Introduction to analysing Go binaries

Security

SANS

22.3.19

Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC

Security

Securityweek

22.3.19

Worldwide spending on security solutions expected to continue growing

Security

Net-security

22.3.19

Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

Security

Net-security

21.3.19

Google Fined $1.7 Billion for Anti-Competitive Practices in Online Advertising

Security

Bleepingcomputer

21.3.19

Researchers Use UPnP Protocol to Unmask IPv6 Address

Security

Securityweek

21.3.19

Windows Hello Support Added to Firefox 66

Security

Securityweek

21.3.19

You may trust your users, but can you trust their files?

Security

Net-security

21.3.19

Latest tactics used by cybercriminals to bypass traditional email security

Security

Net-security

20.3.19

Heeere's Clippy! He's Back, but Only for Microsoft Teams.

Security

Bleepingcomputer

20.3.19

Microsoft Edge Insider Closer to Release With New Installers

Security

Bleepingcomputer

20.3.19

Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!

Security

SANS

20.3.19

A network is only as strong as its weakest shard

Security

Net-security

20.3.19

Unsurprisingly, only 14% of companies are compliant with CCPA

Security

Net-security

20.3.19

Nearly half of organizations lack the necessary talent to maintain security measures

Security

Net-security

19.3.19

Old Tech Spills Digital Dirt on Past Owners

Security

Threatpost

19.3.19

Slack Launched Encryption Key Addon For Businesses

Security

Securityaffairs

19.3.19

Google Open Sources Sandboxed API

Security

Securityweek

19.3.19

Slack Introduces Enterprise Key Management Tool

Security

Securityweek

19.3.19

Wireshark 3.0.0 and Npcap: Some Remarks

Security

SANS

19.3.19

The art of securing ERP applications: Protecting your critical business processes

Security

Net-security

19.3.19

Four key security tips when using any collaboration technology

Security

Net-security

19.3.19

The modern threat landscape and expanding CISO challenges

Security

Net-security

19.3.19

Tax season scaries: How to keep your data safe from insider threats

Security

Net-security

18.3.19

Latest trends in automated threat intelligence-driven network security

Security

Net-security

18.3.19

Meet the new generation of white hats

Security

Net-security

17.3.19

Insider Threats Get Mean, Nasty and Very Personal

Security

Threatpost

16.3.19

New Tune Extension Turns Google Chrome Into a Safe Space

Security

Bleepingcomputer

16.3.19

Google Took Down 2.3 Billion Bad Ads in 2018

Security

Securityweek

15.3.19

It is the first time in the history that civic groups hold a protest against a national CERT

Security

Securityaffairs

15.3.19

Torrent Risks: How to get infected through torrent with a good reputation

Security

Securityaffairs

15.3.19

Binary Analysis with Jupyter and Radare2

Security

SANS

15.3.19

90% of consumers value additional security measures to verify mobile-based transactions

Security

Net-security

15.3.19

Thinking of threat intelligence as a contributing member of your security team

Security

Net-security

15.3.19

Is AI really intelligent or are its procedures just averagely successful?

Security

Net-security

14.3.19

Microsoft Edge Insider Addons Store Discovered, 84 Extensions

Security

Bleepingcomputer

14.3.19

Unsecured API Leads to 'Yelp for Conservatives' App Data Leak

Security

Bleepingcomputer

14.3.19

CCleaner Professional Adds Software Updater Feature

Security

Bleepingcomputer

14.3.19

Public-interest technology: Why companies should get involved

Security

Net-security

14.3.19

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

Security

Threatpost

14.3.19

Three Ways DNS is Weaponized and How to Mitigate the Risk

Security

Threatpost

14.3.19

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Security

Thehackernews

14.3.19

Tip: Ghidra & ZIP Files

Security

SANS

14.3.19

Moving from traditional on-premise solutions to cloud-based security

Security

Net-security

13.3.19

Mozilla releases Firefox Send, a free encrypted file transfer service

Security

Net-security

13.3.19

Data management challenges are having a severe impact on profitability

Security

Net-security

12.3.19

Box Enterprise Shared Links Leak Sensitive Information

Security

Securityweek

12.3.19

Ten Principles for a New Approach to Regulating the Internet

Security

Securityweek

12.3.19

Is your company leaking sensitive data via its Box account?

Security

Net-security

12.3.19

Hidden third-party tags could be leaving Fortune 100 companies at risk

Security

Net-security

11.3.19

Webinar – DevSecOps at Hulu: When security and DevOps meet

Security

Net-security

10.3.19

A Comparison Study of SSH Port Activity - TCP 22 & 2222

Security

SANS

8.3.19

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityaffairs

8.3.19

Analysing meterpreter payload with Ghidra

Security

SANS

8.3.19

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityweek

7.3.19

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

Security

Securityweek

7.3.19

Cybersecurity Startup PolySwarm Launches Malware Detection Marketplace

Security

Securityweek

6.3.19

Sale of SSL/TLS certificates on the dark web is rampant

Security

Net-security

6.3.19

Armor Scientific Emerges From Stealth With Wearable Authentication Solution

Security

Securityweek

6.3.19

Users are too confident in their protection from threats

Security

Net-security

5.3.19

Boost Windows 10 Performance with Retpoline Spectre Mitigation

Security

Bleepingcomputer

5.3.19

Security Shifts Left to be Part of Software Development Best Practice: Report

Security

Securityweek

5.3.19

Alphabet's Chronicle Launches Security Telemetry Platform

Security

Securityweek

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

The patterns of elite DevSecOps practices

Security

Net-security

5.3.19

Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Security

Net-security

4.3.19

Microsoft Rolls Out Spectre Variant 2 Mitigations for Windows 10

Security

Securityweek

4.3.19

KnowBe4 Announces New Funding Round at $800 Million Valuation

Security

Securityweek

4.3.19

Cisco Publishes Annual CISO Benchmark Study

Security

Securityweek

4.3.19

RSAC 2019: An Antidote for Tech Gone Wrong

Security

Threatpost

4.3.19

The Wireshark Foundation released Wireshark 3.0.0Security

Securityaffairs

4.3.19

A strong security posture starts with application dependency mapping

Security

Net-security

4.3.19

IT teams are struggling with network infrastructure challenges caused by the cloud

Security

Net-security

4.3.19

Organizations are seeing integration challenges hinder digital transformation initiatives

Security

Net-security

3.3.19

Chrome and Firefox Can Take Screenshots of Sites From the Command Line

Security

Bleepingcomputer

3.3.19

First Hacker Millionaire on HackerOne

Security

Bleepingcomputer

2.3.19

Kaspersky AV Having Certificate Conflicts with Google Chromecast

Security

Bleepingcomputer

2.3.19

Wireshark 3 Released with New Npcap Windows Packet Capturing Driver

Security

Bleepingcomputer

2.3.19

YouTube Disables Comments on Videos with Young Children

Security

Bleepingcomputer

2.3.19

Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech

Security

Bleepingcomputer

2.3.19

Two White Hats Earn Over $1 Million via Bug Bounty Programs

Security

Securityweek

1.3.19

Wireshark 3.0.0 Released

Security

Securityweek

1.3.19

Microsoft Unveils New Azure, Windows Defender ATP Tools

Security

Securityweek

1.3.19

Businesses need to rethink security priorities due to shifting trends

Security

Net-security

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

Mozilla May Reject UAE Firm's Root Inclusion Request

Security

Securityweek

26.2.19

Ad Blocking With Pi Hole

Security

SANS

25.2.19

ICANN calls for wholesale DNSSEC deployment

Security

Net-security

25.2.19

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security

Securityaffairs

25.2.19

New Service From Cisco's Duo Labs Analyzes Chrome Extensions

Security

Securityweek

25.2.19

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security

Securityaffairs

25.2.19

Crooks offer millions to skilled black hats to help them in

Security

Securityaffairs

25.2.19

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Security

Threatpost

23.2.19

Pulse Secure Unveils Software Defined Perimeter Solution

Security

Securityweek

22.2.19

Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On

Security

Bleepingcomputer

22.2.19

Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash

Security

Bleepingcomputer

22.2.19

Should you trust that Chrome extension? Use CRXcavator to decide

Security

Net-security

22.2.19

Exposure of sensitive data via cloud applications and services increases 20%

Security

Net-security

22.2.19

92% of organizations rank users as their primary security concern

Security

Net-security

22.2.19

The risks associated with the influx of unauthorized collaboration tools

Security

Net-security

21.2.19

Google's Nest Hub Has a Microphone It Forgot to Mention

Security

Securityweek

21.2.19

Firms Moving Sensitive Data to Cloud, But Security Still a Problem: Oracle

Security

Securityweek

21.2.19

GitHub Increases Rewards, Scope For Bug-Bounty Program

Security

Threatpost

21.2.19

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

Security

Threatpost

21.2.19

Prevent shadow IT: Companies need security covering multiple communication vectors

Security

Net-security

20.2.19

GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards

Security

Bleepingcomputer

20.2.19

Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

Security

Bleepingcomputer

20.2.19

Armorblox Emerges From Stealth With Natural Language Understanding Platform

Security

Securityweek

20.2.19

GitHub Increases Bug Bounty Program Rewards, Expands ScopeSecurity

Securityweek

20.2.19

Microsoft to Kill Updates for Legacy OS Using SHA-1

Security

Threatpost

20.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Security

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security

Securityaffairs

19.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Security

Net-security

19.2.19

Indicators of poor password hygiene exposed

Security

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Security

Net-security

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS

31.1.19

Skyscanner launches a public bug bounty program

Security

Securityaffairs

31.1.19

The Tricky Balance in Declining or Accepting Online Payments

Security

Securityweek

31.1.19

Taking ethical action in identity: 5 steps for better biometrics

Security

Net-security

31.1.19

Microsoft rolls out new tools for enterprise security and compliance teams

Security

Net-security

31.1.19

Tracking Unexpected DNS Changes

Security

Net-security

30.1.19

Travel Search Website Skyscanner Launches Bug Bounty Program

Security

Securityweek

30.1.19

DNS Providers to Cease Implementing DNS Resolver Workarounds

Security

Securityweek

30.1.19

Mozilla Firefox 65 Ups the Ante on Privacy with Anti-Tracking Efforts

Security

Threatpost

30.1.19

Feds Dismantle Dark Web Credentials Market

Security

Threatpost

30.1.19

Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65

Security

Net-security

30.1.19

Enterprises are struggling with cloud complexity and security

Security

Net-security

29.1.19

Salt Security Emerges From Stealth With API Protection Solution

Security

Securityweek

29.1.19

How to Recover Lost or Deleted Files?

Security

Thehackernews

29.1.19

Boardrooms Are Still Not Singing the Security Song

Security

Securityweek

29.1.19

Aztarna – the open-source scanning tool for vulnerable robots

Security

Securityaffairs

29.1.19

How privacy and security concerns affect password practices

Security

Net-security

29.1.19

What steps consumers need to take to protect themselves online

Security

Net-security

29.1.19

Relaying Exchange?s NTLM authentication to domain admin (and more)

Security

SANS

28.1.19

Misinformation Woes Could Multiply With 'Deepfake' Videos

Security

Securityweek

28.1.19

Microsoft 365 Suffers Massive Two Day Outage, Outlook and Exchange Down

Security

Bleepingcomputer

28.1.19

Google Chrome Adding Support for Signed HTTP Exchanges

Security

Bleepingcomputer

28.1.19

Microsoft To-Do Beta Finally Lets You Attach Files to Tasks

Security

Bleepingcomputer

28.1.19

Resolve to Be More Involved In Your Local Community - REVISITED

Security

SANS

28.1.19

How to know when you’re ready for a fractional CISO

Security

Net-security

28.1.19

How accepting that your network will get hacked will help you develop a plan to recover faster

Security

Net-security

26.1.19

Are you Ready for DNS Flag Day?

Security

SANS

25.1.19

CISSP Price Hike Dismays Certified Security Professionals

Security

Securityweek

25.1.19

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Security

Securityweek

25.1.19

Fighting Fire with Fire: API Automation Risks

Security

Threatpost

25.1.19

The most effective security strategies to guard sensitive information

Security

Net-security

25.1.19

Enterprises turn to MSPs to mitigate huge skills gap concerns

Security

Net-security

24.1.19

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Security

Bleepingcomputer

24.1.19

Millions of PCs Found Running Outdated Versions of Popular Software

Security

Thehackernews

24.1.19

WhiteHat Security Launches New Software Testing Products

Security

Securityweek

24.1.19

Branching out more efficiently and securely with SD-WAN

Security

Net-security

24.1.19

Reimagining risk management to mitigate looming economic dangers

Security

Net-security

23.1.19

Arizona Lawmaker Wants to Tax Porn to Fund Border Security

Security

Bleepingcomputer

23.1.19

Outdated Software Exposes PC Users to Security Risks Says Report

Security

Bleepingcomputer

22.1.19

VLC Responds to Criticism Over Lack of HTTPS for Updates

Security

Securityweek

22.1.19

Business resilience should be a core company strategy, so why are businesses struggling to take action?

Security

Net-security

22.1.19

Agents of disruption: Four testing topics argue the case for agentless security

Security

Net-security

21.1.19

Microsoft launches Azure DevOps bug bounty program

Security

Net-security

21.1.19

Beware the man in the cloud: How to protect against a new breed of cyberattack

Security

Net-security

21.1.19

Machine learning trumps AI for security analysts

Security

Net-security

20.1.19

Mozilla is Adding an Ad Blocker to Firefox Focus 9.0

Security

Bleepingcomputer

19.1.19

PCI SSC Releases New Security Standards for Payment Software

Security

Securityweek

19.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Securityweek

19.1.19

Threatpost News Wrap Podcast For Jan. 18

Security

Threatpost

18.1.19

Microsoft Launches Azure DevOps Bounty Program

Security

Bleepingcomputer

18.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Threatpost

18.1.19

New requirements for the secure design and development of modern payment software

Security

Net-security

17.1.19

I swiped right, Viewing sensitive data cached in your Safari browser.

Security

Securityaffairs

17.1.19

WordPress to Warn on Outdated PHP Versions

Security

Securityweek

15.1.19

Reminder: Microsoft to end support for Windows 7 in 1-year from today

Security

Thehackernews

15.1.19

Mozilla will disable Adobe Flash by default starting from Firefox 69

Security

Securityaffairs

15.1.19

Security Expectations and Mis-Conceptions in Migrating ERP to the Cloud

Security

Securityweek

15.1.19

Firefox 69 to Disable Adobe Flash by Default

Security

Securityweek

15.1.19

43% of businesses are still running Windows 7, security threats remain

Security

Net-security

15.1.19

How to build a better CISO

Security

Net-security

15.1.19

Mozilla Kills Default Support for Adobe Flash in Firefox 69

Security

Threatpost

14.1.19

Mozilla to Disable Flash Plugin by Default in Firefox 69

SecurityBleepingcomputer

14.1.19

Most organizations are migrating data for ERP apps to the cloud

Security

Net-security

13.1.19

US Carriers Promise Again to Stop Selling Customer Location Data

Security

Bleepingcomputer

13.1.19

Microsoft 365 Business Gets Self Service Password Reset Writeback

Security

Bleepingcomputer

12.1.19

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

Security

Threatpost

11.1.19

Google Secures Public DNS Queries With DNS-over-TLS

SecuritySecurityweek

11.1.19

Hyatt Hotels Launches Public Bug Bounty Program

SecuritySecurityweek

11.1.19

There’s a sizable gap between confidence in security programs and their effectiveness

Security

Net-security

11.1.19

Google Search Results Spoofed to Create Fake News

Security

Threatpost

10.1.19

Reddit Users Locked Out of Their Accounts for Unusual Activity

Security

Bleepingcomputer

10.1.19

Google Chrome Ad Blocker Expands Worldwide Starting July 9th

Security

Bleepingcomputer

10.1.19

Google Adds DNS-over-TLS Support to Its Public DNS Service

Security

Bleepingcomputer

10.1.19

Hyatt Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

10.1.19

Google Rolls Out Activity Cards to Help You Find Past Searches

Security

Bleepingcomputer

10.1.19

Microsoft Debuts Azure Migrate and Azure Site Recovery Enhancements

Security

Bleepingcomputer

10.1.19

Microsoft Adding Office 365 Threat Auto-Investigation to GCC Offering

SecurityBleepingcomputer
10.1.19

Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

SecurityThehackernews
10.1.19

Understanding how data becomes intelligence is central for any successful security program

SecurityNet-security
10.1.19

Small manufacturers play important role in supply chain security

SecurityNet-security
10.1.19

G Suite warns admins about domain data exfiltration attempts

SecurityNet-security

9.1.19

Transmute Launches Blockchain Framework Focused on Identity

SecuritySecurityweek

9.1.19

Sophos Acquires Cloud Security Firm Avid Secure

SecuritySecurityweek

9.1.19

gganimate: Animate YouR Security Analysis

Security

SANS

9.1.19

Popular coding advice doesn’t necessarily equal secure coding advice

Security

Net-security

8.1.19

Microsoft told to Pay €1100 After Forced Windows 10 Upgrade Breaks PC

SecurityBleepingcomputer

8.1.19

Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever

SecurityThehackernews

8.1.19

Zerodium offers $2 million for remote iOS jailbreak, $1 million for WhatsApp RCE

Security

Net-security

8.1.19

Akamai Acquires Identity Management Firm Janrain

SecuritySecurityweek

8.1.19

ThreatList: Container Security Lags Amidst DevOps Enthusiasm

Security

Threatpost

7.1.19

US Gadget Love Forecast to Grow Despite Trust IssuesSecuritySecurityweek

7.1.19

Shifting the burden: Long-term magnifying consequence

Security

Net-security

7.1.19

The attack surface is growing faster than it has at any other point in the history of technology

Security

Net-security

7.1.19

Security analytics to reach $12 billion by 2024

Security

Net-security

5.1.19

Weather Channel App in a Deluge of Legal Trouble for Data Misuse

SecurityThreatpost

3.1.19

After 3 years, Google partially fixes a bug in Android Google Chrome

SecuritySecurityaffairs

3.1.19

Microsoft Adds New Microsoft 365 Security and Compliance BundlesSecurityBleepingcomputer

3.1.19

Security Concerns Prompt Closing of Dividend ApplicationsSecuritySecurityweek

3.1.19

Automated System Bypasses Google reCAPTCHA AgainSecuritySecurityweek

3.1.19

New unCaptcha automated system bypasses Google reCAPTCHA once againSecuritySecurityaffairs

2.1.19

wget utility potential leaked password via extended filesystem attributesSecuritySecurityaffairs