- Security 2020 -

Security  List -  2024  2023  2021  2020  2019  2018


Date

Name

Category

Web

31.12.20

Safe-Inet, Insorg VPN services shut down by law enforcement

Security

Bleepingcomputer

31.12.20

Google Chrome disables insecure form warnings after complaintsSecurity

Bleepingcomputer

30.12.20

2020 Work-for-Home Shift: What We Learned

Security

Threatpost

28.12.20

HackerOne announces first bug hunter to earn more than $2M in bug bountiesSecuritySecurityaffairs

26.12.20

CrowdStrike releases free Azure tool to review assigned privilegesSecuritySecurityaffairs

24.12.20

Pandemic year increases bug bounties and report submissionsSecurity

Bleepingcomputer

24.12.20

Firefox 84 dramatically boosts performance on Apple Silicon MacsSecurity

Bleepingcomputer

24.12.20

Mozilla shares fix for Netflix, Hulu errors on Apple Silicon MacsSecurity

Bleepingcomputer

24.12.20

Google Chrome's high-resource ad blocking spotted in the wildSecurity

Bleepingcomputer

14.12.20

How to make DevSecOps stick with developers

Security

Net-security

14.12.20

Three signs your SOC is ready for XDR

Security

Net-security

14.12.20

Third-party online assets a growing security risk for retailers

Security

Net-security

14.12.20

How COVID-19 has impacted the security threat landscape

Security

Net-security

14.12.20

Remote and cloud-based systems to be ruthlessly targeted next year

Security

Net-security
10.12.20Google Chrome will soon warn you when using weak passwordsSecurity

Bleepingcomputer

10.12.20

Researchers expose the stress levels of workers at different job positions

Security

Net-security

10.12.20

Record Levels of Software Bugs Plague Short-Staffed IT Teams in 2020

Security

Threatpost

9.12.20

How Kali Linux creators plan to handle the future of penetration testing

Security

Net-security

9.12.20

Open source contributors spending no time on security

Security

Net-security

9.12.20

Industrial pros looking for a more focused approach to digital transformation

Security

Net-security

9.12.20

Rising physical threats putting leaders under pressure

Security

Net-security

8.12.20

‘Free’ Cyberpunk 2077 Downloads Lead to Data Harvesting

Security

Threatpost

8.12.20

Corrupt BASE64 Strings: Detection and Decoding

Security

SANS

7.12.20

Chrome, Edge and Firefox May Leak Information on Installed Apps

Security

Securityweek

7.12.20

oledump's Indicators (video)

Security

SANS

7.12.20

Digital thought clones manipulate real-time online behavior

Security

Net-security

7.12.20

Trends every IT leader needs to know to empower the enterprise

Security

Net-security

6.12.20

The Best Cyber Monday 2020 Security, IT, VPN, & Antivirus Deals

Security

Bleepingcomputer

4.12.20

Imprisoned Hacker Ordered to Be Released, Promptly Deported

Security

Securityweek
4.12.20

Dell Announces New Supply Chain Security Offerings

Security

Securityweek
4.12.20

Detecting Actors Activity with Threat Intel

Security

SANS

4.12.20

How to take SASE from a buzzword to a plan

Security

Net-security

4.12.20

Who are the worst password offenders of 2020?

Security

Net-security

4.12.20

Holiday shopping season fraud stats revealed

Security

Net-security

4.12.20

Growth of cloud-native apps and containerization to define 2021

Security

Net-security

4.12.20

Consumers would like to view internet connectivity as a trusted utility

Security

Net-security

3.12.20Google Chrome will let you search through your open tabsSecurity

Bleepingcomputer

3.12.20Google Chrome now lets you execute commands via the address barSecurity

Bleepingcomputer

3.12.20Hands on with Microsoft Edge's Smart Copy feature for tabular dataSecurity

Bleepingcomputer

3.12.20

Traffic Analysis Quiz: Mr Natural

Security

SANS

3.12.20

The challenges of keeping a strong cloud security posture

Security

Net-security

3.12.20

Face recognition software making progress at recognizing masked faces

Security

Net-security

3.12.20

Cloud-native benefits stifled by critical security and networking issues

Security

Net-security
3.12.20

Which security practices lead to best security outcomes?

Security

Net-security
2.12.20

The three stages of security risk reprioritization

Security

Net-security

2.12.20

Cloud native security: A maturing and expanding arena

Security

Net-security

2.12.20

Demand for private network deployments will be driven by heavy industry verticals

Security

Net-security
2.12.20

How prevalent is DNS spoofing? Could a repeat of the Dyn/Mirai DDoS attack have the same results?

Security

Net-security
1.12.20Dox, steal, reveal. Where does your personal data end up?SecuritySecurelist
1.12.20

Dozens of Dormant North American Networks Suspiciously Resurrected at Once

Security

Securityweek

1.12.20

Decrypting PowerShell Payloads (video)

Security

SANS

1.12.20

The CISO’s guide to rapid vendor due diligence

Security

Net-security

30.11.20

Tens of Dormant North American Networks Suspiciously Resurrected at Once

Security

Securityweek

30.11.20

Quick Tip: Using JARM With a SOCKS Proxy

Security

SANS

30.11.20

How do I select a pentesting solution for my business?

Security

Net-security

30.11.20

Review: The Perfect Weapon

Security

Net-security

30.11.20

84% of global decision makers accelerating digital transformation plans

Security

Net-security

29.11.20

Here's how to enable Google Chrome's new modern PDF reader

Security

Bleepingcomputer

29.11.20

Hundreds of C-level executives credentials available for $100 to $1500 per accountSecuritySecurityaffairs

27.11.20

GitHub reinstates YouTube-dl, promises to overhaul DMCA reviewsSecurity

Bleepingcomputer

27.11.20

Changing Employee Security Behavior Takes More Than Simple Awareness

Security

Threatpost

27.11.20

The current state of third-party risk management

Security

Net-security

27.11.20

Top digital security worries when it comes to remote employees

Security

Net-security

26.11.20

Live Patching Windows API Calls Using PowerShell

Security

SANS

26.11.20

How to mitigate risks in an interconnected intelligent enterprise

Security

Net-security

25.11.20

Cloud Security Company Lightspin Emerges From Stealth Mode

Security

Securityweek

25.11.20

Lookalike domains and how to outfox them

Security

Securelist

25.11.20

Canonical Publishes Secure Container Application Images on Docker Hub

Security

Securityweek

25.11.20

Google Faces UK Scrutiny Over New Advertising Data Revamp

Security

Securityweek

25.11.20

The special case of TCP RST

Security

SANS

25.11.20

SMBs eagerly adopting IaaS, 60% prefer resellers over providers

Security

Net-security

25.11.20

XDR: Unifying incident detection, response and remediation

Security

Net-security

25.11.20

How the pandemic has accelerated existing risk trends

Security

Net-security

25.11.20

IT and data management challenges for 2021

Security

Net-security

25.11.20

Four easy steps for organizations to hand over data control

Security

Net-security

23.11.20

Companies rely on crowdsourced security to boost security efforts

Security

Net-security

23.11.20

Even the world’s freest countries aren’t safe from internet censorship

Security

Net-security

23.11.20

What is the future of working professional education?

Security

Net-security

23.11.20

eBook: Secure Software Development

Security

Net-security

22.11.20

Malwarebytes is kicking Windows printers offlineSecurity

Bleepingcomputer

21.11.20

Experts warn of mass-scanning for ENV files left unsecured onlineSecuritySecurityaffairs

21.11.20

Trend Micro Releases Free Tool to Tackle Misinformation

Security

Securityweek

20.11.20

Microsoft Boosts Security of 365 Priority Accounts

Security

Securityweek

19.11.20

Google Chrome to block JavaScript redirects on web page URL clicksSecurity

Bleepingcomputer

19.11.20

Mozilla Boosts Security in Firefox With HTTPS-Only Mode

Security

Securityweek

19.11.20

Study Finds New Employees Immediately Given Access to Millions of Files

Security

Securityweek

19.11.20

Microsoft Releases EDR for Linux in Public Preview

Security

Securityweek

18.11.20

Defining Security Policies to Manage Remote Insider ThreatsSecurityThreatpost

18.11.20

New Zoom Features Tackle Meeting DisruptionsSecuritySecurityweek

18.11.20

When Security Controls Lead to Security Issues

Security

SANS

18.11.20

How do I select a security assessment solution for my business?

Security

Net-security

18.11.20

CISOs say a distributed workforce has critically increased security concerns

Security

Net-security

18.11.20

Multi-cloud environments leaving businesses at risk

Security

Net-security

18.11.20

Network traffic and consumption trends in 2020

Security

Net-security

17.11.20

Unixfreaxjp at #R2CON2020 presented shellcode basics for radare2

Security

Securityaffairs

17.11.20

“At-Risk Meeting Notifier Zoom” feature alerts meeting organizers of Zoombombing risk

Security

Securityaffairs

17.11.20

Crooks use software skimmer that pretends to be a security firmSecuritySecurityaffairs

16.11.20

Mozilla Says Intermediate CA Preloading Reduces Connection Errors in FirefoxSecuritySecurityweek

16.11.20

Why biometrics will not fix all your authentication woes

Security

Net-security

16.11.20

2021 predictions for the Everywhere Enterprise

Security

Net-security

16.11.20

Accept your IT security limits and call in the experts

Security

Net-security

16.11.20

Explosion in digital commerce pushed fraud incentive levels sky-high

Security

Net-security

16.11.20

Risk professionals expect a dynamic risk environment in 2021

Security

Net-security

16.11.20

Apple Unveils Security Features in New M1 ChipSecuritySecurityweek

16.11.20

How a move to the cloud can improve disaster recovery plans

Security

Net-security

16.11.20

Managing risk remains a significant challenge

Security

Net-security

16.11.20

Security teams need visibility into the threats targeting remote workers

Security

Net-security

16.11.20

eBook: The security certification healthcare relies on

Security

Net-security

13.11.20

Enterprises embrace Kubernetes, but lack security tools to mitigate risk

Security

Net-security

13.11.20

ML tool identifies domains created to promote fake news

Security

Net-security

12.11.20

Preventing Exposed Azure Blob Storage

Security

SANS

12.11.20

The security consequences of massive change in how we work

Security

Net-security

12.11.20

Q&A session: Examples of what it takes to achieve DevSecOps maturity

Security

Net-security

11.11.20

Traffic Analysis Quiz: DESKTOP-FX23IK5

Security

SANS

10.11.20

Ultimate Member Plugin for WordPress Allows Site Takeover

Security

Threatpost

10.11.20

The evolving role of the CTO

Security

Net-security

10.11.20

Product showcase: Specops Password Auditor

Security

Net-security

10.11.20

Most UK businesses using Oracle E-Business Suite are running old systems

Security

Net-security

9.11.20

Exploring the progress organizations are making in their investments towards digital resiliency

Security

Net-security

8.11.20

Microsoft outage breaks sites, Windows Store, Xbox, and other servicesSecurity

Bleepingcomputer

7.11.20

GitHub breaks site layout after forgetting to renew certificateSecurity

Bleepingcomputer

6.11.20

Threat Report Portugal: Q3 2020

Security

Securityaffairs

6.11.20

Quantum computers: How to prepare for this great threat to information security

Security

Net-security

6.11.20

How fake news detectors can be manipulated

Security

Net-security

5.11.20

OT Management and Security Firm PAS Global to be Acquired by Hexagon AB

Security

Securityweek

5.11.20

Did You Spot "Invoke-Expression"?

Security

SANS

3.11.20

How businesses rate their own security and compliance risks

Security

Net-security

3.11.20

What CIOs must do to create resilient and adaptive future enterprises

Security

Net-security

2.11.20

Enterprise IT security teams continue to struggle

Security

Net-security

2.11.20

60% of organizations have accelerated their zero trust projects

Security

Net-security

2.11.20

Top tasks IT professionals are spending more time on

Security

Net-security

2.11.20

Most businesses are rethinking how they work

Security

Net-security

31.10.20

Angry YouTube-dl users flood GitHub with new repos after takedown

Security

Bleepingcomputer

30.10.20

Bug-Bounty Awards Spike 26% in 2020

Security

Threatpost

30.10.20

Quick Status of the CAA DNS Record Adoption

Security

SANS

30.10.20

What’s next for cloud backup?

Security

Net-security

29.10.20

How to Run Google SERP API Without Constantly Changing Proxy ServersSecurityThehackernews

29.10.20

Experts Weigh in on E-Commerce Security Amid Snowballing Threats

Security

Threatpost

29.10.20

How the Pandemic is Reshaping the Bug-Bounty Landscape

Security

Threatpost

29.10.20

StackRox Releases Open Source Tool for Finding Kubernetes Misconfigurations

Security

Securityweek

29.10.20

Can automated penetration testing replace humans?

Security

Net-security

29.10.20

Biggest WAN pain points: Security and service flexibility

Security

Net-security

29.10.20

Businesses struggle with data security practices

Security

Net-security

29.10.20

Report: The need for pervasive email security

Security

Net-security

29.10.20

Healthcare network security is slowly improving

Security

Net-security
28.10.20

Holiday Shopping Craze, COVID-19 Spur Retail Security Storm

Security

Threatpost

28.10.20

Amazon Fires Employee Who Leaked Customer Names, Emails

Security

Threatpost
28.10.20

How to apply data protection best practices to the 2020 presidential election

Security

Net-security

28.10.20

How important are vulnerability management investments for a cybersecurity posture?

Security

Net-security

28.10.20

As offices emptied and remote work became the norm, security teams struggled

Security

Net-security

27.10.20

A new threat matrix outlines attacks against machine learning systems

Security

Net-security

27.10.20

Work from home strategies leave many companies in regulatory limbo

Security

Net-security

27.10.20

MDR service essentials: Market trends and what to look for

Security

Net-security

27.10.20

Organizations struggle to obtain quality threat data to guide key security decisions

Security

Net-security

27.10.20

78% of Microsoft 365 admins don’t activate MFA

Security

Net-security

26.10.20

Video: Pascal Strings

Security

SANS

25.10.20

Google Chrome now blocks site notifications with abusive contentSecurity

Bleepingcomputer

24.10.20

Microsoft, MITRE Release Adversarial Machine Learning Threat Matrix

Security

Securityweek

23.10.20

Chrome 86 Starts Blocking Abusive Notification Permission RequestsSecuritySecurityweek

23.10.20

Chrome 86 Aims to Bar Abusive Notification Content

Security

Threatpost

23.10.20

Sooty: SOC Analyst's All-in-One Tool

Security

SANS

22.10.20

Google Chrome and Edge are creating random debug.log log filesSecurity

Bleepingcomputer

22.10.20

Data protection predictions for 2021

Security

Net-security

22.10.20

How tech trends and risks shape organizations’ data protection strategy

Security

Net-security

22.10.20

Organizations with remote workforces need new security solutions

Security

Net-security

21.10.20

Security Testing Company NSS Labs Ceases Operations

Security

Securityweek

21.10.20

Serious Vulnerability in GitHub Enterprise Earns Researcher $20,000

Security

Securityweek

21.10.20

Moving to the cloud with a security-first, zero trust approach

Security

Net-security

21.10.20

CISOs split on how to enable remote work

Security

Net-security

20.10.20

Google Says No Significant Election Influence Campaigns Targeting Its Users

Security

Securityweek

20.10.20

Mirai-alike Python Scanner

Security

SANS

20.10.20

Can we trust passwordless authentication?

Security

Net-security

20.10.20

What is confidential computing? How can you use it?

Security

Net-security

20.10.20

SecOps teams turn to next-gen automation tools to address security gaps

Security

Net-security

20.10.20

Is poor cyber hygiene crippling your security program?

Security

Net-security

20.10.20

Biometric device revenues to drop 22%, expected to rebound in 2021

Security

Net-security

19.10.20

Fooling self-driving cars by displaying virtual objectsSecuritySecurityaffairs

19.10.20

File Selection Gaffe

Security

SANS

19.10.20

Review: Netsparker Enterprise web application scanner

Security

Net-security

19.10.20

Cloud environment complexity has surpassed human ability to manage

Security

Net-security

19.10.20

Is the skills gap preventing you from executing your enterprise strategy?

Security

Net-security

19.10.20

Save 40% on CISSP or CCSP training until November 30

Security

Net-security

18.10.20Intel’s Ice Lake Xeon processors get new security featuresSecurity

Bleepingcomputer

17.10.20News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and MoreSecurityThreatpost
17.10.20TikTok Launches Bug Bounty Program Amid Security SNAFUsSecurityThreatpost
16.10.20

Traffic Analysis Quiz: Ugly-Wolf.net

Security

SANS
16.10.20

New research shows risk in healthcare supply chain

Security

Net-security
14.10.20

Major gaps in virtual appliance security plague organizations

Security

Net-security
14.10.20

Compliance activities cost organizations $3.5 million annually

Security

Net-security
14.10.20

2020 brings unique levels of PKI usage challenges

Security

Net-security
13.10.20

The brain of the SIEM and SOAR

Security

Net-security
13.10.20

In the era of AI, standards are falling behind

Security

Net-security
13.10.20

CPRA: More opportunity than threat for employers

Security

Net-security
12.10.20Watchdog Urges More Action to Protect Planes From HackersSecuritySecurityweek
12.10.20A Self-Service Password Reset Project Can Be A Quick Win For ITSecurityThehackernews
12.10.20'Five Eyes' Alliance Demands Ways to Access Encrypted AppsSecuritySecurityweek
12.10.20

Analyzing MSG Files With plugin_msg_summary

Security

SANS
12.10.20

SaaS adoption prompting concerns over operational complexity and risk

Security

Net-security
11.10.20Chrome 86 rolls out with massive user security enhancementsSecurity

Bleepingcomputer

11.10.20Microsoft pays over $370,000 for Azure Sphere bug reportsSecurity

Bleepingcomputer

11.10.20

Open Packaging Conventions

Security

SANS

10.10.20Slack outage causes lag, message errors, blank screens worldwideSecurity

Bleepingcomputer

10.10.20Online avatar service Gravatar allows mass collection of user infoSecurity

Bleepingcomputer

9.10.20Stuck in Your 'Smart' Chastity Device? Use a Screwdriver, Manufacturer SaysSecuritySecurityweek
9.10.20

How to avoid the most common mistakes of an identity governance program

Security

Net-security
9.10.20

ATM cash-out: A rising threat requiring urgent attention

Security

Net-security
9.10.20

Why are certain employees more likely to comply with information security policies than others?

Security

Net-security
8.10.20Google Readies Redesigned Security Alerts for Google AccountsSecuritySecurityweek
8.10.20

Google’s Chrome 86: Critical Payments Bug, Password Checker Among Security Notables

Security

Threatpost
8.10.20

Securing mobile devices, apps, and users should be every CIO’s top priority

Security

Net-security
8.10.20

Save on CCSP self-paced exam prep when bundled with exam voucher

Security

Net-security
7.10.20

How do I select a data storage solution for my business?

Security

Net-security
7.10.20

Priorities and technologies defining the mainframe in the digital enterprise

Security

Net-security
7.10.20

AWS adds new S3 security and access control features

Security

Net-security
6.10.20

Obfuscation and Repetition

Security

SANS
6.10.20

Working together to secure our expanding connected health future

Security

Net-security
6.10.20

How important is monitoring in DevOps?

Security

Net-security
6.10.20

Progress in implementing ethical and trusted AI-enabled systems still inconsistent

SecurityNet-security
6.10.20

The CISO’s Guide to Third-Party Security Management

Security

Net-security

6.10.20

Nmap 7.90 released: New fingerprints, NSE scripts, and Npcap 1.0.0

Security

Net-security

5.10.20

Why CIOs need to focus on password exposure, not expiration

Security

Net-security

5.10.20

Preventing ecommerce fraud: A look at current trends and patterns

Security

Net-security

5.10.20

Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure

Security

Net-security

5.10.20

NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy

Security

Net-security

5.10.20

Finish the year strong with special pricing on CISSP training thru Oct. 30

Security

Net-security
5.10.20

Nmap 7.90 Released

Security

SANS

4.10.20

HP bug bounty programs now covers flaws in cartridgesSecuritySecurityaffairs
3.10.20Natwest and Malwarebytes team up to provide free virus protectionSecurity

Bleepingcomputer

3.10.20Google Chrome now lets you edit saved passwordsSecurity

Bleepingcomputer

3.10.20New Google ChromeOS updates cause 100% CPU usage, heating issuesSecurity

Bleepingcomputer

2.10.20Internet Engineering Task Force Proposes Standard for Network Time SecuritySecuritySecurityweek
2.10.20Industry Reactions to New Pastebin Security Features: Feedback FridaySecuritySecurityweek
2.10.20Cisco Acquires Kubernetes-Native Security Platform PortshiftSecuritySecurityweek
2.10.20Azure Kubernetes Service Now Supports Confidential ContainersSecuritySecurityweek
2.10.20

Inadequate skills and employee burnout are the biggest barriers to digital transformation

SecurityNet-security
2.10.20

Is passwordless authentication actually the future?

Security

Net-security
2.10.20

Average data queries take too long, yet organizations need daily data insights to make decisions

Security

Net-security
2.10.20

60% of IT pros list improving security as a top priority today

Security

Net-security
2.10.20

Use an NVIDIA GPU? Check whether you need security updates

Security

Net-security
1.10.20

Secretive Big Data Firm Palantir Makes Low-Key Stocks Debut

Security

Securityweek
1.10.20

GitHub Announces General Availability of Code Scanning Feature

Security

Securityweek
30.9.20

Telehealth Poll: How Risky Are Remote Doctor Visits?

Security

Threatpost
30.9.20

Why Web Browser Padlocks Shouldn’t Be Trusted

Security

Threatpost
29.9.20

VMware Unveils New Cloud Workload Security Solution

Security

Securityweek
28.9.20

GRC teams have a number of challenges meeting regulatory demands

Security

Net-security
25.9.20Firefox 81 released with credit card autofill and new themeSecurity

Bleepingcomputer

24.9.20

Credential stuffing is just the tip of the iceberg

Security

Net-security
23.9.20

Microsoft Extending Threat Protection Portfolio, Unifying Security Solutions

Security

Securityweek
23.9.20

HackerOne Paid Out Over $107 Million in Bug Bounties

Security

Securityweek
23.9.20

Kognos Emerges From Stealth With Autonomous XDR Platform

Security

Securityweek
23.9.20

Infosec pros struggle to find opportunities to improve their work skills

Security

Net-security
23.9.20

Most AppSec pros see a growing divide between them and developers

Security

Net-security
22.9.20

Shift to remote work and heavy reliance on service providers for security leaves blind spots

Security

Net-security
21.9.20

Palantir Listing May Shine Light on Secretive Big Data Firm

Security

Securityweek
20.9.20

Microsoft removes Windows Defender ability after security concerns

Security

Bleepingcomputer

20.9.20

Google Chrome is making it easier to reset compromised passwords

Security

Bleepingcomputer

20.9.20Google Drive is having an outage, users see spinning wheelSecurity

Bleepingcomputer

19.9.20Azure now installs security updates on Windows VMs automaticallySecurityBleepingcomputer
17.9.20

Box Showcases New Offerings for Remote Working Environment

Security

Securityweek
17.9.20

Suspicious Endpoint Containment with OSSEC

Security

SANS
17.9.20

Product showcase: AppTrana

Security

Net-security
17.9.20

Most people ignore QR code security concerns

Security

Net-security
17.9.20

GAIA-X to strenghten European digital infrastructure sovereignity

SecurityNet-security
17.9.20

Microsoft open-sources tool that enables continuous developer-driven fuzzing

Security

Net-security
16.9.20

Nozomi Networks Becomes CVE Numbering Authority

Security

Securityweek
16.9.20

QR Codes Serve Up a Menu of Security Concerns

Security

Threatpost
16.9.20

Microsoft open-sourced its Project OneFuzz fuzzing framework for Azure

Security

Securityaffairs
16.9.20

Voatz Under Fire From Infosec Community Over Its Views on Security Research

Security

Securityweek
15.9.20Microsoft Releases Open Source Fuzzing Framework for AzureSecuritySecurityweek
15.9.20

How to enforce real-time controls based on behavior risk scoring

Security

Net-security
14.9.20

Creating patched binaries for pentesting purposes

Security

SANS
14.9.20

Database monitoring improves DevOps success for financial services orgs

Security

Net-security
13.9.20Vivaldi 3.3 can pause the web with new 'Take a Break' featureSecurity

Bleepingcomputer

13.9.20Google Chrome starts blocking ads that slow down the browserSecurity

Bleepingcomputer

12.9.20

What's in Your Clipboard? Pillaging and Protecting the Clipboard

Security

SANS
11.9.20

Four ways network traffic analysis benefits security teams

Security

Net-security
9.9.20

Intelligent processes and tech increase enterprises’ competitiveness

Security

Net-security
9.9.20

(ISC)² Exam Action Plan: Get your certification goals on track for success

Security

Net-security
8.9.20

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

Security

Threatpost
8.9.20

Epic Manchego gang uses Excel docs that avoid detection

Security

Securityaffairs
8.9.20

Google Announces Confidential GKE Nodes, General Availability of Confidential VMs

Security

Securityweek
8.9.20

Global security appliance market revenue grew to $4.2B in Q2 2020

Security

Net-security
8.9.20

Are today’s organizations ready for the data age?

Security

Net-security
7.9.20

Researchers develop secure multi-user quantum communication network

Security

Net-security
7.9.20

How to protect yourself from the hidden threat of evasive scripts

Security

Net-security
4.9.20Namecheap hosting and email DOWN in prolonged outageSecurity

Bleepingcomputer

4.9.20Cisco engineer resigns then nukes 16k WebEx accounts, 456 VMsSecurity

Bleepingcomputer

4.9.20

2020 trends in SOX compliance

Security

Net-security
3.9.20

Sandbox Evasion Using NTP

Security

SANS
3.9.20

Google Increases Bug Bounty Payouts for Abuse Risk Flaws

Security

Securityweek
3.9.20

Python and Risky Windows API Calls

Security

SANS
3.9.20

RedCommander: Open source tool for red teaming exercises

Security

Net-security

3.9.20

Most security leaders feel their programs are mature, but data reveals otherwise

Security

Net-security

3.9.20

Data center ethernet switches deployment increasing 12% year-over-year

Security

Net-security

3.9.20

Microsoft builds deepfakes detection tool to combat election disinformation

Security

Net-security

2.9.20

Tor launches Tor Project Membership Program to financially support its work

Security

Securityaffairs
2.9.20

Essential features of security automation for the AWS platform

Security

Net-security

2.9.20

Companies continue to expose unsafe network services to the internet

Security

Net-security

2.9.20

Tor Project launches program to secure funding for software development

Security

Net-security

2.9.20

(ISC)² research: Why cybersecurity is a great choice for an exciting career

Security

Net-security

1.9.20Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting TodaySecurityThehackernews
1.9.20

Bring your own PC and SASE security to transform global businesses

Security

Net-security

31.8.20

Firefox 80 released with new and faster extensions blocklist

Security

Bleepingcomputer

31.8.20

How to drive business value through balanced development automation

Security

Net-security

28.8.20

Data protection critical to keeping customers coming back for more

Security

Net-security

28.8.20

People spend a little less time looking at fake news headlines than factual ones

Security

Net-security

27.8.20

GrammaTech Releases Open Source API Security Tool

Security

Securityweek

27.8.20

Chrome 85 Released With 20 Security Fixes

Security

Securityweek

27.8.20

Security.txt - one small file for an admin, one giant help to a security researcher

Security

SANS

27.8.20

Facing gender bias in facial recognition technology

Security

Net-security

27.8.20

91% of cybersecurity pros want stricter internet measures to tackle misinformation

Security

Net-security

27.8.20

Researchers develop AI technique to protect medical devices from anomalous instructions

Security

Net-security

27.8.20

A look at enterprise network and application modernization efforts

Security

Net-security

27.8.20

Swap Detector: Open source tool for detecting API usage errors

Security

Net-security

26.8.20

A 2020 approach to security: People matter

Security

Net-security
26.8.20

Researchers aim to improve code patching in embedded systems

Security

Net-security
25.8.20

ERP security: Dispelling common misconceptions

Security

Net-security
25.8.20

PinK: A new way of implementing a key-value store in SSDs

Security

Net-security

24.8.20

COVID-19 impact on digital transformation, cloud and security strategies

Security

Net-security

24.8.20

How can companies avoid the risks of unexpected expenses related to cloud migration?

Security

Net-security

24.8.20

Researchers develop a process to categorize massive datasets, making data more accessible

SecurityNet-security

23.8.20

Spotify hit with outage after forgetting to renew a certifficateSecurity

Bleepingcomputer

23.8.20

Microsoft Teams users can't join meetings hosted in North AmericaSecurity

Bleepingcomputer

23.8.20

Zoom web client outage prevents users from joining meetingsSecurity

Bleepingcomputer

23.8.20

Microsoft is killing off insecure Cloud App Security cipher suitesSecurity

Bleepingcomputer

23.8.20

Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?

Security

SANS

22.8.20Google Chrome will warn users when submitting insecure formsSecurity

Bleepingcomputer

22.8.20Microsoft Edge Dev gets new security and privacy featuresSecurity

Bleepingcomputer

22.8.20New Google Chrome feature makes it easier to browse privatelySecurity

Bleepingcomputer

22.8.20Expired certificate led to an undercount of COVID-19 resultsSecurity

Bleepingcomputer

22.8.20

News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More

Security

Threatpost
21.8.20

Global public cloud services market grew 26% YOY in 2019 with revenues totaling $233.4 billion

Security

Net-security

21.8.20

Save-to-transform as a catalyst for embracing digital disruption

Security

Net-security
20.8.20

Office 365 Mail Forwarding Rules (and other Mail Rules too)

Security

SANS
20.8.20

The Promise and Threat of Quantum Computing

Security

Securityweek
20.8.20

Disrupting a power grid with cheap equipment hidden in a coffee cup

Security

Net-security

20.8.20

62% of blue teams have difficulty stopping red teams during adversary simulation exercises

Security

Net-security

20.8.20

Thousands of ISO certifications at risk of lapsing due to halted re-certification audits

Security

Net-security

20.8.20

Expand your cloud expertise: Discount on CCSP training

Security

Net-security

19.8.20

Five ways to maximize FIDO

Security

Net-security

19.8.20

The benefits of providing employees with an identity compromise solution

Security

Net-security

19.8.20

Telehealth is the future of healthcare, but how secure is it?

Security

Net-security

19.8.20

Large-scale migrations away from on-premise environments are underway

Security

Net-security

18.8.20

Chrome 86 will prominently warn about insecure forms on secure pages

Security

Net-security

18.8.20

ISC Blocked

Security

SANS
18.8.20

How do I select a risk assessment solution for my business?

Security

Net-security

18.8.20

Why do healthcare organizations have a target on their back?

Security

Net-security

18.8.20

Terrascan open source software helps developers build secure cloud infrastructure

Security

Net-security

18.8.20

Pandemic accelerates investments in tech, automation, workplace transformation

Security

Net-security

17.8.20

3 tips to increase speed and minimize risk when making IT decisions

Security

Net-security

17.8.20

Internal audit leaders should develop new skills to stay relevant

Security

Net-security

16.8.20Google Home erroneous update reveals the $450 million ADT dealSecurity

Bleepingcomputer

16.8.20Microsoft paid almost $14M in bounties over the last 12 monthsSecurity

Bleepingcomputer

16.8.20

Wireshark 3.2.6 Released

Security

SANS
15.8.20

Threat Report Portugal: Q2 2020

Security

Securityaffairs
13.8.20FireEye Launches Public Bug Bounty Program on BugcrowdSecuritySecurityweek
13.8.20

SD-WAN: A key enabler for remote workforces and enhanced security

Security

Net-security

11.8.20Data Security Company Symmetry Systems Emerges From StealthSecuritySecurityweek
11.8.20'Have I Been Pwned' Code Base Going Open SourceSecuritySecurityweek
10.8.20

Scoping web application and web service penetration tests

Security

SANS

10.8.20Firefox 79 released with new Lockwise password export featureSecurity

Bleepingcomputer

10.8.20

The precision of security undermined by a failure to correlate

Security

Net-security

10.8.20

Internal investigations are changing in the age of COVID-19

Security

Net-security

10.8.20

Why the rapid transition to cloud demands that DevOps shift left

Security

Net-security

8.8.20

Scanning Activity Include Netcat Listener

SecuritySANS
7.8.20Have I Been Pwned Set to Go Open-SourceSecurityThreatpost
7.8.20

What are the benefits of automated, cloud-native patch management?

Security

Net-security

7.8.20

Consumers don’t entirely trust smart home tech

Security

Net-security

6.8.20

How can security leaders maximize security budgets during a time of budget cuts?

Security

Net-security

6.8.20

Misconfigured cloud storage services are commonplace in 93% of deployments

Security

Net-security

6.8.20

25% of IT workers don’t enforce security policies

Security

Net-security

5.8.20

Drone Maker DJI Says Claims About Security of Pilot App 'Misleading'

Security

Securityweek

5.8.20

Newsletter WordPress Plugin Opens Door to Site TakeoverSecurity

Threatpost

5.8.20

Microsoft Paid Out Nearly $14 Million via Bug Bounty Programs in Past YearSecuritySecurityweek

5.8.20

Engaging business units in security governance: Why everyone should be concerned

Security

Net-security

5.8.20

As personal use of managed devices becomes ubiquitous, risks increase

Security

Net-security

5.8.20

Many companies have not taken basic steps to protect their remote workforce

Security

Net-security

4.8.20

Analysis of 92 billion rejected emails uncovers threat actors’ motivations

Security

Net-security

4.8.20

PE Tree: Free open source tool for reverse-engineering PE files

Security

Net-security

4.8.20

Google Updates Ad Policies to Counter Influence Campaigns, ExtortionSecurity

Threatpost

4.8.20

BlackBerry Releases Open Source Reverse Engineering ToolSecurity

Securityweek

4.8.20

A Silicon Valley business exec’s tips for maintaining organizational security

Security

Net-security

4.8.20

How to implement expedited security strategies during a crisis

Security

Net-security

4.8.20

The pandemic had a negative impact on data center operations

Security

Net-security

4.8.20

Granting employees admin status is convenient but risky

Security

Net-security

4.8.20

How AI can alleviate data lifecycle risks and challenges

Security

Net-security

4.8.20

IT skills shortage forces organizations to prioritize education

Security

Net-security

1.8.20

Building a .freq file with Public Domain Data Sources

Security

SANS

31.7.20

Mimecast Acquires Messaging Security Provider MessageControl

Security

Securityweek

31.7.20

Python Developers: Prepare!!!

Security

SANS

31.7.20

Global CPaaS market to reach $25 billion by 2025

Security

Net-security

30.7.20

Delivering and maintaining security at the speed of digital transformation

Security

Net-security

30.7.20

Things to consider when selecting enterprise SSDs for critical workloads

Security

Net-security

29.7.20

AWS Fraud Detection Service Becomes Generally AvailableSecurity

Securityweek

29.7.20

All I want this Tuesday: More Data

Security

SANS

29.7.20

Security teams increasingly stressed due to lack of proper tools, executive support

Security

Net-security

29.7.20

Assessing the email security controls used by 10,000 U.S. state and local election administrators

Security

Net-security

29.7.20

Building a quantum internet: Fast data exchange, difficult to eavesdrop

Security

Net-security

28.7.20

How well do face recognition algorithms identify people wearing masks?

Security

Net-security

28.7.20

Bluetooth-Enabled 'Mooltipass' Hardware Password Manager Unveiled

Security

Securityweek

28.7.20

In Memory of Donald Smith

Security

SANS

28.7.20

The distinction between human and bot behavior is becoming increasingly blurred

Security

Net-security

28.7.20

NIST selects algorithms to form a post-quantum cryptography standard

Security

Net-security

28.7.20

75% of cardholders prefer contactless cards to other payment methods

Security

Net-security

27.7.20

REMnux 7, a Linux toolkit for malware analysts released

Security

Securityaffairs

27.7.20

Integrated cloud-native security platforms can overcome limitations of traditional security products

Security

Net-security

27.7.20

Data crisis: Companies pivot from disruption to transformation

Security

Net-security
26.7.20ndisasm Update 2.15SecuritySANS
26.7.20Linux-based malware analysis toolkit REMnux 7 releasedSecurity

Bleepingcomputer

25.7.20

News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Security

Threatpost

25.7.20

Quantum Loop: US Unveils Blueprint for 'Virtually Unhackable' Internet

Security

Securityweek

24.7.20

Compromized Desktop Applications by Web Technologies

Security

SANS

24.7.20

The future of work: 74% believe they will emerge stronger

Security

Net-security

24.7.20

IT teams failing to deliver a positive remote employee experience

Security

Net-security

23.7.20

Deep Packet Inspection challenges for telecom and security vendors

Security

Net-security

23.7.20

There’s CISSP training, then there’s official CISSP training

Security

Net-security

22.7.20

New Security Capabilities Announced for Microsoft 365, Azure

Security

Securityweek

22.7.20

Researchers develop new learning algorithm to boost AI efficiency

Security

Net-security

21.7.20

Couple of interesting Covid-19 related stats

Security

SANS

21.7.20

Sextortion Update: The Final Final Chapter

Security

SANS

21.7.20

Internet security is improving, but exposures still run rampant

Security

Net-security

21.7.20

Everyone’s talking about microservices, who’s actually doing it?

Security

Net-security

21.7.20

Digital transformation: Affected and accelerated by COVID-19

Security

Net-security

21.7.20

Infosec is a mindset as well as a job, but burnout can happen to anyone

Security

Net-security

20.7.20

People work more while at home, but worry about data security

Security

Net-security

20.7.20

Healthcare technology goals and CIO challenges

Security

Net-security

20.7.20

Cloud services help adapt and respond to COVID-19 challenges

Security

Net-security

19.7.20

Zone.Identifier: A Coupe Of Observations

Security

SANS

18.7.20

Cloudflare outage takes down Discord, BleepingComputer, and other sitesSecurity

Bleepingcomputer

17.7.20

A look at modern adversary behavior and the usage of open source tools in the enterprise

SecurityNet-security

17.7.20

Most global brands fail to implement security controls to prevent data leakage and theft

Security

Net-security

17.7.20

The effectiveness of using DNS as a foundational element in future network security best practices

Security

Net-security

17.7.20

Tech sector job interviews test performance anxiety rather than competence at coding

Security

Net-security

16.7.20

Why Can Application Security Be Considered A Enabler For Business?SecurityThehackernews

16.7.20

Google Chrome ends Windows 10 memory optimization test after CPU hit

Security

Bleepingcomputer

16.7.20

Chrome 84 released with important security enhancements

Security

Bleepingcomputer

16.7.20

How secure is your web browser?

Security

Net-security

16.7.20

New threat environment elements and global attack trends

Security

Net-security

16.7.20

Data professionals: Job security and shifting career priorities in the wake of the pandemic

Security

Net-security

15.7.20

Email impersonations becoming pervasive, preying on a distracted and dispersed workforce

Security

Net-security

15.7.20

Businesses express concerns around ethical risks for their AI initiatives

Security

Net-security

15.7.20

Is DNS a vital component of your security strategy?

Security

Net-security

14.7.20

How do I select a network detection and response solution for my business?

Security

Net-security

13.7.20

Google updates policies to ban any ads for surveillance solutions and services

Security

Securityaffairs

13.7.20

Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all

Security

Net-security

12.7.20

Microsoft will not support PHP 8.0 for Windows in 'any capacity'Security

Bleepingcomputer

12.7.20

Uber Eats outage in multiple countries, 'Internal Server Error" reportsSecurity

Bleepingcomputer

12.7.20

Risky blogspot.in domain for sale after Google fails to renew itSecurity

Bleepingcomputer

12.7.20

New Google Chrome feature to drastically reduce battery usageSecurity

Bleepingcomputer

11.7.20

Google Bans Stalkerware Ads – With a LoopholeSecurityThreatpost

10.7.20

An effective cloud security posture begins with these three step

Security

Net-security

10.7.20

USB storage devices: Convenient security nightmares

Security

Net-security

10.7.20

Companies see the importance of integrated solutions to streamline business processes

Security

Net-security
9.7.20Advertising Plugin for WordPress Threatens Full Site TakeoversSecurityThreatpost
9.7.20

70% of organizations experienced a public cloud security incident in the last year

Security

Net-security
9.7.20

In the age of disruption, comprehensive network visibility is key

Security

Net-security
9.7.20

BYOD adoption is growing rapidly, but security is lagging

Security

Net-security
8.7.20Project Freta, a free service that allows finding malware in OS memory snapshotsSecuritySecurityaffairs
8.7.20

How do I select an application security testing solution for my business?

Security

Net-security

8.7.20

Tech businesses must rethink their IT infrastructure

Security

Net-security

7.7.20Free Microsoft Service Looks at OS Memory Snapshots to Find MalwareSecurity

Securityweek

7.7.20Microsoft Launches Free Linux Forensics and Rootkit Malware Detection ServiceSecurityThehackernews
7.7.20

Business efficiency metrics are more important than detection metrics

Security

Net-security

7.7.20

Elasticsearch security: Understand your options and apply best practices

Security

Net-security

7.7.20

Global data center networking market to reach $40.9 billion by 2025

Security

Net-security
6.7.20

Data exfiltration: The art of distancing

Security

Net-security

4.7.20Zoom Got Big Fast. Then Videobombers Made It Rework SecuritySecuritySecurityweek
6.20Looking at Big Threats Using Code Similarity. Part 1SecuritySecurelist
30.5.20ACLU Sues Clearview AI Over Faceprint Collection, SaleSecurityThreatpost
30.5.20

The Impact of Researchers on Our Data

Security

SANS
29.5.20

Why is SDP the most effective architecture for zero trust strategy adoption?

Security

Net-security
29.5.20

Employees abandoning security when working remotely

Security

Net-security
29.5.20

Global WAN optimization market forecast to reach $1.4 billion by 2025

Security

Net-security
28.5.20CISO Conversations: Mastercard, Ellie Mae Security Chiefs Discuss the People ProblemSecurity

Securityweek

28.5.20

A New Free Monitoring Tool to Measure Your Dark Web ExposureSecurityThehackernews
28.5.20

Solving the security challenges of remote working

Security

Net-security

28.5.20

HackerOne Says Bug Bounty Hunters Earned $100 Million Through Its PlatformSecuritySecurityweek
28.5.20

C-suite execs often pressure IT teams to make security exceptions for them

Security

Net-security

27.5.20

Application threats and security trends you need to know about

Security

Net-security

27.5.20

What’s trending on the underground market?

Security

Net-security

27.5.20

Maintaining the SOC in the age of limited resources

Security

Net-security

27.5.20

Patented algorithms predict, identify, diagnose and prevent abnormalities in complex systems

Security

Net-security
26.5.20

ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It

Security

Threatpost

26.5.20

How do I select a backup solution for my business?

Security

Net-security

26.5.20

What hinders successful threat hunting?

Security

Net-security

26.5.20

Global DX spending to grow 10.4% in 2020

Security

Net-security

25.5.20eBay port scans visitors' computers for remote access programsSecurityBleepingcomputer
25.5.20Coronavirus Pandemic Claims Another Victim: RobocallsSecuritySecurityweek
25.5.20

Wireshark 3.2.4 Released

Security

SANS

25.5.20

Organizations plan to migrate most apps to the cloud in the next year

Security

Net-security

25.5.20

In an increasingly 5G and edge world, DNS matters

Security

Net-security

22.5.20

Create a safe haven for your customers to build loyalty

Security

Net-security
21.5.20Microsoft Announces New Security Features for Devs, CustomersSecuritySecurityweek
21.5.20How to enable the new Google Chrome 83 features nowSecurity

Bleepingcomputer

21.5.20Chrome 83 released with massive security and privacy upgradesSecurity

Bleepingcomputer

21.5.20

Chrome 83 Brings Enhanced Safe Browsing, New Privacy and Security Controls

Security

Securityweek
21.5.20

The missing link in your SOC: Secure the mainframe

Security

Net-security
21.5.20

What do IGA solutions have in common with listening to music anywhere?

Security

Net-security
21.5.20

How secure are open source libraries?

Security

Net-security
21.5.20

Only 36% of critical infrastructures have a high level of cyber resilience

Security

Net-security
21.5.20

COVID-19 is driving diverging perspectives as enterprises decide which technologies to focus on

Security

Net-security
21.5.20

RedisAI and RedisGears address challenges customers have as they move AI into production

Security

Net-security
20.5.20Tech-Assisted COVID-19 Tracking Is Having Some IssuesSecuritySecurityweek
20.5.20

Chrome 83: Enhanced Safe Browsing, Secure DNS, a Safety Check

Security

Net-security
20.5.20

CEOs and CISOs disagree on cyber strategies

Security

Net-security
20.5.20

With the threat landscape continuously changing, businesses must be ready for anything

Security

Net-security
20.5.20

With increased DevOps adoption, roles in software development teams are changing

Security

Net-security
20.5.20

Technologies in all layers of the cloud stack are at risk

Security

Net-security
20.5.20

Over half of security leaders still rely on spreadsheets

Security

Net-security
19.5.20

Automating nmap scans

Security

SANS
19.5.20

CISOs are critical to thriving companies: Here’s how to support their efforts

Security

Net-security
19.5.20

Review: Kill Chain: The Cyber War on America’s Elections

Security

Net-security
19.5.20

How a good user experience brings the pieces of the enterprise IT jigsaw together

Security

Net-security
19.5.20

Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic

Security

Net-security
19.5.20

How data intelligent organizations mitigate risk

Security

Net-security
18.5.20

Redefining business for a digital world with smart security decisions

Security

Net-security
18.5.20

Security threats associated with shadow IT

Security

Net-security
18.5.20

Shifting responsibility is causing uncertainty and more security breaches

Security

Net-security
18.5.20

Identity-related breaches on the rise, prevention still a work in progress

Security

Net-security
18.5.20

Less than a quarter of Americans use a password manager

Security

Net-security
17.5.20

Coronavirus-themed attacks May 10 – May 16, 2020

Security

Securityaffairs
17.5.20Google Chrome will block resource-heavy ads starting AugustSecurity

Bleepingcomputer

16.5.20

News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Security

Threatpost

15.5.20

Hashes in PowerShell

Security

SANS
15.5.20Palo Alto Networks addresses tens of serious issues in PAN-OSSecuritySecurityaffairs
15.5.20Venafi Acquires Kubernetes Services Provider JetstackSecuritySecurityweek
15.5.20

Base Conversions and Creating GUI Apps in PowerShell

Security

SANS
15.5.20

COVID-19 online fraud trends: Industries, schemes and targets

Security

Net-security

15.5.20

Businesses vulnerable to emerging risks have a gap in their insurance coverage

Security

Net-security

15.5.20

Educational organizations use cloud apps to share sensitive data outside of IT control

Security

Net-security
14.5.20

This Group of CISOs Is Pumping Their Own Money and Advice Into Security Startups

Security

Securityweek
14.5.20

Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity

Security

Thehackernews
14.5.20

Eye-opening statistics about open source security, license compliance, and code quality risk

Security

Net-security

14.5.20

Unexpected downtime is crippling businesses, causing revenue losses

Security

Net-security

14.5.20

New features in Nutanix’s HCI platform simplify disaster recovery to protect business critical apps

Security

Net-security
13.5.20

How to implement least privilege in the cloud

Security

Net-security

13.5.20

Cybersecurity and compliance: Vital priorities for MSPs and their clients

Security

Net-security

13.5.20

Global remote work transitions fail to consider security gaps

Security

Net-security

12.5.20

(ISC)2 Professional Development Institute: Timely and continuing education opportunities

Security

Net-security

12.5.20

Is remote work here to stay?

Security

Net-security

12.5.20

Home workplaces introduce new risks, poor password hygiene

Security

Net-security

12.5.20

Gain free access to Utilizing Big Data course, a $200 value

Security

Net-security

11.5.20Coronavirus-themed attacks May 03 – May 09, 2020Security

Securityaffairs

11.5.20

Leveraging automation to maximize security budgets

Security

Net-security
11.5.20

Biometric device shipments revenue to drop by $2 billion

Security

Net-security

11.5.20

Open source algorithms for network graph analysis help discover patterns in data

Security

Net-security

10.5.20Surface Laptop 3 screens with spontaneous cracks now fixed for freeSecurity

Bleepingcomputer

10.5.20New Google Authenticator update makes it worth using againSecurity

Bleepingcomputer

10.5.20Firefox 76.0.1 released to fix broken Amazon extension, crashesSecurity

Bleepingcomputer

10.5.20Unemployed Americans offered ‘remote jobs’ as money mulesSecurity

Bleepingcomputer

10.5.20SAP announces security issues in cloud-based productsSecurity

Bleepingcomputer

10.5.20Microsoft releases May Office updates with fixes for auth issuesSecurity

Bleepingcomputer

10.5.20

Nmap Basics - The Security Practitioner's Swiss Army Knife

Security

SANS

9.5.20

GitHub shuts down Popcorn Time repositories due to MPA DMCA noticeSecurity

Bleepingcomputer

9.5.20

Office 365 to stop data theft by disabling external forwardingSecurity

Bleepingcomputer

9.5.20Cloud Security Company Ermetic Emerges From Stealth ModeSecurity

Securityweek

8.5.20

Zoom Agrees to Step Up Security After New York Probe

Security

Securityweek

8.5.20

Financial services leading the way in adopting DevOps, still hurdles remain

Security

Net-security

8.5.20

Is the stress of card fraud worth the digital convenience?

Security

Net-security

7.5.20

Recorded Future Releases Free Threat Intelligence Browser ExtensionSecurity

Securityweek

7.5.20

Seventy Percent of Firms Sacrifice Security for Faster InnovationSecurity

Securityweek

7.5.20

Shifts in device usage have large security implications

Security

Net-security

7.5.20

Get official CCSP online self-paced training

Security

Net-security

6.5.20

Microsoft announces limited Azure Sphere bug bounty program

Security

Net-security

6.5.20

Recorded Future to Provide Free Access to Elite Intelligence Through New Browser Extension

Security

Securityaffairs

6.5.20

Future of work: Delivering a modern workspace

Security

Net-security

5.5.20

COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare?

Security

Securityweek
5.5.20

Cloud Security Features Don't Replace the Need for Personnel Security Capabilities

Security

SANS
5.5.20

How to prevent permission bloat: Overlooked and hidden access

Security

Net-security
5.5.20

Online learning surges as people look for ways to be productive at home

Security

Net-security
4.5.20

Help your helpdesk: Empower employees to self-reset their AD account password

Security

Net-security
4.5.20

Despite spending more on compliance, businesses still have basic IT weaknesses

Security

Net-security
4.5.20

CISSP online self-paced training only $561 for a limited time

Security

Net-security
3.5.20Microsoft Edge getting improved security, work at home featuresSecurity

Bleepingcomputer

3.5.20Google updates Chrome Web Store policy to block extension spamSecurity

Bleepingcomputer

2.5.20

News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware AttacksSecurityThreatpost

1.5.20

Growth of APIs for new services

Security

Net-security

1.5.20

What’s happening with all things cloud: Existing and future cloud strategies

Security

Net-security

30.4.20

Passwordless Authentication Provider 'Secret Double Octopus' Raises $15 Million

Security

Securityweek

30.4.20

Google announces cull of low-quality, misleading Chrome extensions

Security

Net-security

30.4.20

YARA 4.0.0 Released With Important New Features

Security

Securityweek

30.4.20

Cato SDP: Cloud-Scale and Global Remote Access Solution Review

Security

Thehackernews

30.4.20

EFF: Google, Apple’s Contact-Tracing System Open to CyberattacksSecurity

Threatpost

30.4.20

Critical GitLab Flaw Earns Bounty Hunter $20KSecurityThreatpost

30.4.20

ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and TravelSecurity

Threatpost

30.4.20

Collecting IOCs from IMAP Folder

Security

SANS

30.4.20

Suspicious business emails increase, imposters pretend to be executives

Security

Net-security

30.4.20

Organizations look to build resiliency with hybrid and multi-cloud architectures

Security

Net-security

29.4.20

Is the future of information security and tech conferences virtual?

Security

Net-security
29.4.20

Assessing the risks of ACH payments

Security

Net-security
28.4.20Cloud Security Company Accurics Emerges From Stealth ModeSecuritySecurityweek
28.4.20Mozilla Says Many Popular Video Call Apps Meet Its Minimum Security StandardsSecuritySecurityweek
28.4.20Researchers Uncover Novel Way to De-anonymize Device IDs to Users' BiometricsSecurityThehackernews
28.4.20

The state of data quality: Too much, too wild and too skewed

Security

Net-security
28.4.20

How to formulate a suitable identity proofing strategy

Security

Net-security
28.4.2064% of workers say their quality of work has improved amid pandemic disruptionSecurityNet-security
27.4.20Coronavirus-themed attacks April 19 – April 25, 2020SecuritySecurityaffairs
27.4.20

Powershell Payload Stored in a PSCredential Object

Security

SANS
27.4.20

Three firmware blind spots impacting securit

Security

Net-security
27.4.20

Understanding the basics of API security

Security

Net-security
27.4.20

Third-party compliance risk could become a bigger problem

Security

Net-security
27.4.20

Most IT leaders believe remote workers are a security risk

Security

Net-security
26.4.20Researchers: 30,000% increase in pandemic-related threatsSecurity

Bleepingcomputer

26.4.20Experts found Symlink race issues in 28 antivirus productsSecuritySecurityaffairs
25.4.20

News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security

Security

Threatpost
24.4.20New GreyNoise Service Alerts Organizations of Compromised NetworksSecuritySecurityweek
24.4.20

WHO, CDC and Bill and Melinda Gates Foundation Victims of Credential Dump, Report

Security

Threatpost
24.4.20

Fake Skype, Signal Apps Used to Spread Surveillanceware

Security

Threatpost
24.4.20

Five best practices for achieving and maintaining SOC 2 compliance

Security

Net-security
24.4.20

Client-side web security

Security

Net-security
24.4.20

Work-from-home creates multitude of opportunities for leaks

Security

Net-security
24.4.20

The true costs incurred by businesses for technology downtime

Security

Net-security
23.4.20Cybereason Unveils New Mobile Device Security OfferingsSecuritySecurityweek
23.4.20Researchers Turn Antivirus Software Into Destructive ToolsSecuritySecurityweek
23.4.20Connected Home Hubs Open Houses to Full Remote TakeoverSecurityThreatpost
23.4.20

Google unveils secure remote access service to unburden enterprise VPNs

Security

Net-security

23.4.20

With a transition to remote work, network visibility becomes more critical than ever

Security

Net-security

23.4.20

Bad bot traffic increases, comprising almost one quarter of all website traffic

Security

Net-security

23.4.20

Application performance becoming a key concern, influenced by increasing SD-WAN complexity

Security

Net-security

23.4.20

Try the (ISC)2 Utilizing Big Data course – a $200 value – for FREE!

Security

Net-security

22.4.20

Five contingency best practices for SOCs to handle uncertainty

Security

Net-security
21.4.20Google Launches Cloud-Based Remote Access SolutionSecuritySecurityweek

21.4.20

Google Creates COVID-19 Grant Fund to Boost Bug HuntingSecuritySecurityweek

21.4.20

Coronavirus Crisis Forces Tor Project LayoffsSecuritySecurityweek
21.4.20

SpectX: Log Parser for DFIR

Security

SANS
21.4.20

COVID-19 affects web traffic and attack trends

Security

Net-security

20.4.20

Multi-cloud key management and BYOK

Security

Net-security

20.4.20

Tor Project cut a third of its staff due to the CoronavirusSecuritySecurityaffairs

20.4.20

Understanding web security solutions

Security

Net-security
20.4.20

Does working remotely actually work?

Security

Net-security

19.4.20

Coronavirus-themed attacks April 12 – April 18, 2020SecuritySecurityaffairs

18.4.20

Google reenables FTP support in Chrome due to pandemicSecurity

Bleepingcomputer

17.4.20

Weaponized RTF Document Generator & Mailer in PowerShell

Security

SANS
17.4.20Zoom Rolls Out New Measures as Security Fears MountSecuritySecurityweek
17.4.20Zoom Revamps Bug Bounty ProgramSecuritySecurityweek
17.4.20

Office printers: The ticking IT time bomb hiding in plain sight

Security

Net-security
17.4.20

Surge in remote working reveals concerns around unprotected endpoints

Security

Net-security
17.4.20

What type of data is trending on the dark web?

Security

Net-security
17.4.20

Researchers develop self-healing and self-concealing PUF for hardware security

Security

Net-security
16.4.20Tencent Ups Top Bug-Bounty Award to $15KSecurityThreatpost
16.4.20Digital.ai Launches With Software Development and Security PlatformSecuritySecurityweek
16.4.20

On my mind: Transitioning to third-party cloud services

Security

Net-security
16.4.20

Information security goes non-binary

SecurityNet-security
16.4.20

Challenges companies face when implementing digital transformation initiatives

Security

Net-security
15.4.20

Meet AttackerKB, Rapid7's Crowdsourced Vulnerability Knowledge Base

Security

Securityweek
15.4.20

How to Steer Your Security Organization in a Toxic Environment

Security

Securityweek

15.4.20

Microsoft offers free threat notification service to healthcare, human rights organizations

Security

Net-security

15.4.20Tencent Partners With HackerOne for Bug Bounty ProgramSecuritySecurityweek
15.4.20Google Keeps Support for FTP in ChromeSecuritySecurityweek
15.4.20

Application security: Getting it right, from the start

Security

Net-security

15.4.20

Will Zoom manage to retain security-conscious customers?

Security

Net-security

14.4.20

Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords

Security

Securityweek
14.4.20

Zscaler to Acquire Cloudneeti to Solve Cloud Misconfiguration Problems

Security

Securityweek
14.4.20

The dangers of assumptions in security

Security

Net-security

14.4.20

Shift to work-from-home: Most IT pros worried about cloud security

Security

Net-security

14.4.20

New lower pricing for CISSP, CCSP and SSCP online instructor-led training

Security

Net-security

13.4.20

Coronavirus-themed attacks April 05 – April 11, 2020SecuritySecurityaffairs

13.4.20

When your laptop is your workspace, the real office never closes

Security

Net-security

13.4.20

Small businesses unprepared for remote working, most don’t provide cybersecurity training

Security

Net-security

13.4.20

You have to consider cybersecurity at all points of a cloud migration

Security

Net-security

12.4.20Zoom removes meeting IDs from client title bar to boost securitySecurity

Bleepingcomputer

12.4.20fox now tells Mozilla what your default browser is every daySecurity

Bleepingcomputer

12.4.20Hackers accessed staff mailboxes at Italian bank Monte dei PaschiSecuritySecurityaffairs
10.4.20

Performing deception to OS Fingerprint (Part 1: nmap)

Security

SANS
10.4.20

Enterprises regard the cloud as critical for innovation, but struggle with security

Security

Net-security

9.4.20

Zoom Working on Security Improvements Amid More Bans

Security

Securityweek
9.4.20

Video conferencing for teams and consumers: What is the right choice for you?

Security

Net-security
9.4.20

ThreatList: Skype-Themed Apps Hide a Raft of Malware

Security

Threatpost
9.4.20

What do CISOs want from cybersecurity vendors right now?

Security

Net-security

9.4.20

Third-party risk is broken, businesses unprepared for supply chain disruptions

Security

Net-security

9.4.20

Pandemic driving global e-commerce growth, but fraud is on the increase too

Security

Net-security
8.4.20Official Government COVID-19 Apps Hide a Raft of ThreatsSecurity

Threatpost

8.4.20Free Security Tools, Resources Offered During Coronavirus OutbreakSecuritySecurityweek
8.4.20

On-demand webinar: Securing your remote workforce

Security

Net-security
7.4.20

Increase in RDP Scanning

Security

SANS
7.4.20

Testing and Accountability

Security

Securelist
7.4.20Beyond Zoom: How Safe Are Slack and Other Collaboration Apps?Security

Threatpost

7.4.20ENISA released a Tool to map dependencies to International StandardsSecuritySecurityaffairs
7.4.208,000 Unprotected Redis Instances Accessible From InternetSecuritySecurityweek
7.4.20Microsoft Launches Free Zero Trust Assessment ToolSecuritySecurityweek
7.4.20

Download: CISO Checklist for Secure Remote Working

Security

Net-security

6.4.20Coronavirus-themed attacks March 29 – April 04, 2020SecuritySecurityaffairs
6.4.20

Threat detection and the evolution of AI-powered security solutions

Security

Net-security

6.4.20

Total end-user spending on IT infrastructure products recovers

Security

Net-security

3.4.20

Is remote work the new normal?

Security

Net-security

3.4.20

While nearly 90% of companies are backing up data, only 41% do it daily

Security

Net-security

3.4.20

Most find data security challenging with respect to UCaaS/CCaaS deployments

Security

Net-security

2.4.20

Mozilla will fund open source COVID-19-related technology projects

Security

Net-security

2.4.20

TPOT's Cowrie to ISC Logs

Security

SANS

2.4.20

How can you strengthen an enterprise third-party risk management program?

Security

Net-security

2.4.20

vFeed: Leveraging actionable vulnerability intelligence as a service indicators

Security

Net-security

2.4.20

Best practices and challenges in adopting continuous software testin

Security

Net-security

1.4.20AWS Security Service 'Amazon Detective' Now Generally AvailableSecuritySecurityweek
1.4.20Zoom Scrutinized As Security Woes MountSecurity

Threatpost

1.4.20Internet Society Expands Program for Secure Internet Routing FrameworkSecuritySecurityweek
1.4.20

Researchers develop a way to quickly purge old network data

Security

Net-security

1.4.20

CISO’s guide to choosing an automated security questionnaire platform

Security

Net-security

31.3.20

CISOs Suffering From Increasingly Complex Workload: CiscoSecuritySecurityweek

31.3.20

CISO Conversations: Verizon, AT&T CISOs Talk Communications Sector SecuritySecuritySecurityweek

31.3.20

Distributed disruption: Coronavirus multiplies the risk of severe cyberattac

Security

Net-security

31.3.20

21% of SMBs do not have a data backup or disaster recovery solution in plac

Security

Net-security

31.3.20

Steering your network in the right direction with segmentation

Security

Net-security

31.3.20

The potential impact of SAP security remediation

Security

Net-security
31.3.20

Researchers find shift in monthly web traffic amidst pandemic

Security

Net-security

31.3.20

Remote work and web conferencing: Security and privacy considerations

Privacy  Security

Net-security

30.3.20

Crashing explorer.exe with(out) a click

Security

SANS

30.3.20

Organizations not properly set up to manage risk, coronavirus pandemic reveals

Security

Net-security

30.3.20

Whitepaper: Cloud security risks and how to mitigate them

Security

Net-security

29.3.20

Coronavirus-themed attacks March 22 – March 28, 2020SecuritySecurityaffairs

29.3.20

Google Advises Against Disabling Sites During the PandemicSecurity

Bleepingcomputer

29.3.20

Google Resumes Chrome Releases on an Adjusted ScheduleSecurity

Bleepingcomputer

29.3.20

Google Chrome Adding Option to Always Show Full URLsSecurity

Bleepingcomputer

29.3.20

Mozilla Firefox Gets a HTTPS Only Mode For More Secure BrowsingSecurity

Bleepingcomputer

29.3.20

TeamViewer Stops Commercial Use Checks in Coronavirus-Affected RegionsSecurity

Bleepingcomputer

28.3.20

Google to Abandon Chrome 82 Development Due to Release DelaysSecurity

Bleepingcomputer

27.3.20GitHub Paid Out Over $1 Million in Bug BountiesSecuritySecurityweek
27.3.20

While many migrate security tools to the cloud, concerns remain

Security

Net-security

27.3.20

Researchers use AI and create early warning system to identify disinformation online

Security

Net-security
27.3.20

No, Corona Antivirus can’t fight COVID-19

Security

Net-security
25.3.20

Cloud-native security considerations for critical enterprise workloads

Security

Net-security
25.3.20

How to secure customer data for SaaS success

Security

Net-security

25.3.20

Five steps to maintain business continuity during the coronavirus pandemic

Security

Net-security

24.3.20

Another Critical COVID-19 Shortage: Digital Security

Security

SANS

24.3.20

What’s preventing organizations from making pragmatic security decisions?

Security

Net-security

24.3.20

Increasing number of false positives causing risk of alert fatigue

Security

Net-security

24.3.20

Top priorities for business leaders during COVID-19 crisis

Security

Net-security

23.3.20

User Survey 2020 Report Shows Rapid Growth In Apache Pulsar AdoptionSecurityThehackernews
23.3.20

Crowdsourced pentesting is not without its issues

Security

Net-security

23.3.20

Personal data protection today: We should demand more

Security

Net-security
23.3.20

AI efforts are maturing from prototype to production, but obstacles remain

Security

Net-security

22.3.20

Firefox Reenables Insecure TLS to Improve Access to COVID19 InfoSecurity

Bleepingcomputer

22.3.20

Mozilla to Remove Support for FTP in Firefox

Security

Securityweek

21.3.20

Xbox Live and Support.xbox.com Experiencing an OutageSecurity

Bleepingcomputer

21.3.20

News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own

Security

Threatpost

20.3.20

Cloud Misconfig Mistakes Show Need For DevSecOps

Security

Threatpost

20.3.20

How finance leaders plan to react to COVID-19

Security

Net-security

19.3.20

Cisco addresses multiple issues in its SD-WAN product

Security

Securityaffairs

19.3.20

Too many alarms and too few security analysts? Think SOAR

Security

Net-security

19.3.20

Increase web application security without causing any user disruption

Security

Net-security

19.3.20

Exploring the risky behavior of IT security professionals

Security

Net-security

19.3.20

Organizations still struggle to manage foundational security

Security

Net-security

18.3.20

Sixgill Introduces Dark Web Data Feed ProductSecuritySecurityweek

18.3.20

This Stalkerware Delivers Extra-Creepy FeaturesSecurity

Threatpost

18.3.20

Private Application Access Firm Axis Security Emerges From StealthSecuritySecurityweek

18.3.20

Security is leaving the data center and moving to the edge

Security

Net-security

17.3.20

Unplanned work makes it hard to deliver digital transformation

Security

Net-security

17.3.20

Guide: Supplier CCPA readiness for security and IT teams

Security

Net-security

16.3.20

How organizations can maintain a third-party risk management program from day one

Security

Net-security

16.3.20

Three actions to boost your organization’s resilience against coronavirus disruptions

Security

Net-security

16.3.20

Early investment in quantum computing could result in a competitive advantage

Security

Net-security

15.3.20

Google Is Not Creating a Nationwide Coronavirus Info SiteSecurity

Bleepingcomputer

15.3.20Google Chrome Gets 'Default to Guest' Mode for Stateless BrowsingSecurity

Bleepingcomputer

14.3.20Google Stops Issuing Security Warnings About Microsoft EdgeSecurity

Bleepingcomputer

14.3.20Working from Home: COVID-19’s Constellation of Security ChallengesSecurity

Threatpost

13.3.20

$100K Paid Out for Google Cloud Shell Root Compromise

Security

Threatpost

13.3.20

Not all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames

Security

SANS
13.3.20

How to begin tapping the full value of your data

Security

Net-security
12.3.20

Applying the 80/20 rule to cloud security

Security

Net-security
11.3.20

Facebook Awards $55,000 for Flaw That Could Lead to Account Hijacking

Security

Securityweek
11.3.20

Multi-cloud and edge deployments threatened by security and connectivity problems

Security

Net-security
11.3.20

DNS over HTTPS misuse or abuse: How to stay secure

Security

Net-security
10.3.20

Google Allows Enrolling Security Keys on More Devices

Security

Securityweek
10.3.20

WatchGuard Technologies to Acquire Panda Security

Security

Securityweek
10.3.20

Why a risk-based approach to application security can bolster your defenses

Security

Net-security

10.3.20

What is open threat intelligence and what is driving it?

Security

Net-security
10.3.20

Researchers develop data exchange approach with blockchain-based security features

Security

Net-security
10.3.20

eBook: Automating Incident Response

Security

Net-security
9.3.20

Europe’s Gaia-X cloud service faces a difficult future

Security

Net-security
9.3.20

Automate manual security, risk, and compliance processes in software development

Security

Net-security

7.3.20

Microsoft MVP Summit Now A Virtual Conf Over Coronavirus FearsSecurity

Bleepingcomputer

7.3.20

Chain Reactor: Simulate Adversary Behaviors on Linux

OS  Security

SANS
6.3.20Let’s Encrypt Pushes Back Deadline to Revoke Some TLS CertificatesSecurity

Threatpost

6.3.20

A Safe Excel Sheet Not So Safe

Security

SANS
5.3.20Mokes and Buerak distributed under the guise of security certificatesSecuritySecurelist
5.3.20

Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization

Security

Net-security
5.3.20

Guide: 10 critical issues to cover in your vendor security questionnaires

Security

Net-security
4.3.20Have I Been Pwned No Longer For SaleSecurity

Threatpost

4.3.20

How adaptive trust makes security efficient

Security

Net-security

4.3.20

Social engineering: Mind the identity verification gap

Security

Net-security
3.3.20Super Tuesday Marks First Major Security Test of 2020SecuritySecurityweek
3.3.20

Soon, your password will expire permanently

Security

Net-security

3.3.20

Security operations and the evolving landscape of threat intelligence

Security

Net-security

3.3.20

Researchers use ultrasound waves vibrating through tables to access cellphones

Security

Net-security
3.3.20

Download guide: Advanced Threat Protection Beyond the AV

Security

Net-security

2.3.20

5 considerations for building a zero trust IT environment

Security

Net-security

2.3.20

Exploring the impact that hybrid cloud is having on enterprise security and IT teams

Security

Net-security
1.3.20Chrome and Firefox Extension Lets You View Deleted Web PagesSecurity

Bleepingcomputer

1.3.20

Hiding Windows File Extensions is a Security Risk, Enable NowSecurity

Bleepingcomputer

1.3.20Credit Card Skimmer Uses Fake CDNs To Evade DetectionSecurity

Bleepingcomputer

1.3.20

Brave Browser Integrates Wayback Machine to View Deleted Web PagesSecurity

Bleepingcomputer

1.3.20

Hazelcast IMDG Discover Scan

Security

SANS
1.3.20

Crooks are attempting to take over tens of thousands of WordPress sites

Security

Securityaffairs

29.2.20

uBlock Origin 1.25 Now Blocks Cloaked First-Party Scripts, Firefox OnlySecurity

Bleepingcomputer

29.2.20

Mozilla Enables DNS-over-HTTPS by Default for All USA UsersSecurity

Bleepingcomputer

29.2.20

Google Brings Its Lighthouse Pagespeed Extension to FirefoxSecurity

Bleepingcomputer

28.2.20

Show me Your Clipboard Data!

Security

SANS

27.2.20

Framework Isolates Libraries in Firefox to Improve SecuritySecuritySecurityweek

27.2.20

Online 'Impersonator' Tried to Contact Campaigns, DNC SaysSecuritySecurityweek

27.2.20

Hacker Earns $8,500 for Vulnerability in HackerOne PlatformSecuritySecurityweek

27.2.20

Offensive Tools Are For Blue Teams Too

Security

SANS

27.2.20

McAfee Buys Browser Isolation Firm Light Point SecuritySecuritySecurityweek

27.2.20

A new way for securing web browsers from hackers

Security

Net-security

27.2.20

One in five SMBs use no endpoint security at all

Security

Net-security

27.2.20

What is driving the machine identity crisis?

Security

Net-security

26.2.20

Intel Announces New Hardware-based Security CapabilitiesSecuritySecurityweek

25.2.20

European Commission has chosen the Signal app to secure its communicationsSecuritySecurityaffairs

25.2.20

HackerOne Surpasses $82 Million in Paid BountiesSecuritySecurityweek

25.2.20

Infoblox announces enterprise best practices for DoT/DoH

Security

Net-security

25.2.20

BEC Group Abuses Google G Suite in Scheme Targeting Thousands of FirmsSecuritySecurityweek

25.2.20

Researchers trick autonomous car autopilot with phantom images

Security

Net-security

25.2.20

Review: Specops Key Recovery

Security

Net-security

25.2.20

Mismanagement of Device Identities Could Cost Businesses Billions: Report

Security

Securityweek

25.2.20

Cisco Unveils SecureX Security Platform

Security

Securityweek

25.2.20

Cybersecurity hiring challenges and retention issues demand new talent pipelines

Security

Net-security

25.2.20

Cloud-based collaboration tools are a major driver of data exfiltration

Security

Net-security

25.2.20

The importance of risk reduction for robotic process automation

Security

Net-security

25.2.20

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Security

Net-security

24.2.20

Changing the mindset of the CISO: From enforcer to enabler

Security

Net-security

24.2.20

Organizations lack confidence in their network security

Security

Net-security

24.2.20

97% of IT leaders worried about insider data breaches

Security

Net-security

24.2.20

Download: The Ultimate Security Pros’ Checklist

Security

Net-security

23.2.20

Google Tells Microsoft Edge Users To Get Chrome for Better SecuritySecurity

Bleepingcomputer

23.2.20

Tesla Pays $10K for Microsoft SQL Server Reporting Services BugSecurity

Bleepingcomputer

21.2.20

Looking at the future of identity access management (IAM)

Security

Net-security

21.2.20Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate PlatformSecuritySecurityweek
21.2.20Cometdocs Threatens Legal Action Over Disclosure of Security IssuesSecuritySecurityweek
21.2.20

Whodat? Enumerating Who "owns" a Workstation for IR

Security

SANS

21.2.20

Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

Security

Net-security

21.2.20

Worldwide ICT spending forecast to reach $4.3 trillion in 2020

Security

Net-security

20.2.20

What is flowing through your enterprise network?

Security

Net-security

20.2.20

Are CISOs ready for zero trust architectures?

Security

Net-security

20.2.20

Cloud misconfigurations surge, organizations need continuous controls

Security

Net-security

19.2.20

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information SecureSecuritySecurityaffairs
19.2.20Google Brings Titan Security Keys to More CountriesSecuritySecurityweek
19.2.20

The top four Office 365 security pain points

Security

Net-security
18.2.20

Microsoft Trials Election Security Solution in Wisconsin

Security

Securityweek
18.2.20Google Axes 500 Chrome Extensions Exfiltrating User DataSecuritySecurityweek
18.2.20

IT and business process automation growing with cloud architectures

Security

Net-security

17.2.20Launching the First “Yomi Hunting” Challenge!SecuritySecurityaffairs
17.2.20

SecOps teams face challenges in understanding how security tools work

Security

Net-security

17.2.20

Researchers design a tool to identify the source of errors caused by software update

Security

Net-security
17.2.20

Key technology trends that will redefine businesses over the next three years

Security

Net-security

17.2.20

SOAR or not to SOAR?

Security

SANS
15.2.20Google Removes Dashlane Password Manager from Chrome Web StoreSecurity

Bleepingcomputer

15.2.20

StockX Adds 2-Step Verification for Better Security, Enable NowSecurity

Bleepingcomputer

15.2.20

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Security

Threatpost

14.2.20Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus UsersSecuritySecurityweek

14.2.20

Keep an Eye on Command-Line Browsers

Security

SANS
14.2.20

43% of IT professionals are still tracking assets in spreadsheets

Security

Net-security

14.2.20

Digital certificates still cause unplanned downtime and application outages

Security

Net-security
14.2.20

Global spending on smart cities initiatives to total nearly $124 billion in 2020

Security

Net-security

13.2.20

Security pros anticipate automation will reduce IT security headcount, but not replace human expertise

Security

Net-security

13.2.20

A closer look at the global threat landscape

Security

Net-security

13.2.20

Employees aware of privacy risks, but unsure of how they affect the workplace

Security

Net-security

13.2.20

Crucial trends shaping the managed services market

Security

Net-security

13.2.20

Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification

Security

Net-security

12.2.20

Credential exposure report: Poor password habits still pose a serious threat

Security

Net-security

12.2.20

Download: IR Management and Reporting PowerPoint template

Security

Net-security

12.2.20

MorganFranklin names Jason Berland as Managing Director of its IAM service offering

Security

Net-security

11.2.20

Cybersecurity is a board level issue: 3 CISOs tell why

Security

Net-security

11.2.20

Organizations struggling to find skilled security staff, leaving 82% of security teams understaffed

Security

Net-security

11.2.20

eBook: 8 Real World Use Cases for SOAR

Security

Net-security

10.2.20

The future of DNS security: From extremes to a new equilibrium

Security

Net-security

10.2.20

Study: The Blind Spots of Email Security

Security

Net-security

8.2.20Office 365 to Block Harmful Content Regardless of Custom ConfigsSecurity

Bleepingcomputer

8.2.20Google Chrome To Bar HTTP File DownloadsSecurity

Threatpost

8.2.20Wacom Tablet Data Exfiltration Raises Security ConcernsSecurity

Threatpost

8.2.20Chrome Will Block Insecure Downloads on HTTPS PagesSecuritySecurityweek
7.2.20Charming Kitten Uses Fake Interview Requests to Target Public FiguresSecurity

Threatpost

7.2.20Dropbox Passes $1M Milestone for Bug-Bounty PayoutsSecurity

Threatpost

7.2.20

Discrepancies between data sanitization policy creation and execution put data at risk

Security

Net-security

6.2.20

Chrome 80 Released With 56 Security Fixes

Security  Vulnerebility

Securityweek

6.2.20

Google Shared Private Videos With Wrong Users

Security

Securityweek

6.2.20

Fake browser update pages are "still a thing"

Security

SANS

5.2.20Microsoft detects 77,000 active web shells on a daily basisSecuritySecurityaffairs
5.2.20Dropbox paid more than $1 Million via its bug bounty programSecuritySecurityaffairs
5.2.20Irish Regulator Probes Google, Tinder Over Data ProcessingSecuritySecurityweek
5.2.20Dropbox Paid Out Over $1 Million Through Bug Bounty ProgramSecuritySecurityweek
5.2.20

HECVAT toolkit helps higher education institutions assess cloud adoption risk

Security

Net-security

5.2.20

Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns

Security

Net-security

4.2.20

State-sponsored actors may have abused Twitter API to de-anonymize users

Security

Net-security

4.2.20

Tesla Autopilot Duped By ‘Phantom’ Images

Security

Threatpost

4.2.20

Automation is advancing faster than the enterprise knowledge required to support it

Security

Net-security
3.2.20

Interconnectivity and networking predictions for 2020 and beyond

Security

Net-security

3.2.20

Do your employees feel valued? 64% have one foot out the door

Security

Net-security
3.2.20

Now available: eSentire’s 2019 Annual Threat Intelligence Report

SecurityNet-security
2.2.20Microsoft Launches Xbox Bounty Program With $20K Maximum PayoutSecurity

Bleepingcomputer

2.2.20Google Chrome Tests Replacing URLs With Search Queries in Address BarSecurity

Bleepingcomputer

2.2.20Google Pays $6.5 Million to Hackers for Reporting Security BugsSecurity

Bleepingcomputer

1.2.20Google Rolls Back Change Making Search Results Look Like AdsSecurity

Bleepingcomputer

1.2.20

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Security

Threatpost

1.2.20

Zero Day Initiative Bug Hunters Rake in $1.5M in 2019

Security

Threatpost

31.1.20

Google Open Sources Code for Security Key DevicesSecuritySecurityweek

31.1.20

Make your own security key with Google’s OpenSK

Security

Net-security

31.1.20

Microsoft invites gamers and researchers to new Xbox bug bounty program

Security

Net-security

31.1.20

New Project Informs Security Teams of Phished UsersSecuritySecurityweek

31.1.20

House Committee Passes Bills Improving CISA Leadership and AuthoritySecuritySecurityweek

30.1.20

AI-based Document Classification Firm Concentric Emerges From StealthSecuritySecurityweek

30.1.20

Google Sets Record High in Bug-Bounty Payouts

Security

Threatpost

30.1.20

Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

Security

Threatpost

30.1.20

How to prioritize IT security projects

Security

Net-security

30.1.20

Organizational culture defines a successful cloud strategy

Security

Net-security

30.1.20

How industries are evolving their DevOps and security practices

Security

Net-security

30.1.20

Tech pros should consider modern APM tools to gain insight across the entire application stack

Security

Net-security

29.1.20

Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019

Security

Securityweek
29.1.20

Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more!

Security

Net-security

29.1.20

2020: A year of deepfakes and deep deception

Security

Net-security

29.1.20

50% of people would exercise at least one right under the CCPA

Security

Net-security
28.1.20

How to detect and prevent issues with vulnerable LoRaWAN networks

Security

Net-security

28.1.20

Security risks for e-scooters and riders exposed

Security

Net-security

28.1.20

Benefits of blockchain pilot programs for risk management planning

Security

Net-security

27.1.20

Is Threat Hunting the new Fad?

Security

SANS

26.1.20Sonos Backtracks: Legacy Devices Will Get Updates After MaySecurity

Bleepingcomputer

26.1.20

LastPass Mistakenly Removes Extension from Chrome Store, Causes OutageSecurityBleepingcomputer
26.1.20ProtonVPN Apps Open Sourced for Added Transparency and SecuritySecurity

Bleepingcomputer

26.1.20

Visibility Gap of Your Security Tools

Security

SANS

25.1.20Microsoft Releases Azure Security BenchmarkSecuritySecurityweek
23.1.20Data Security Startup Privafy Emerges From Stealth ModeSecuritySecurityweek
23.1.20

Zero Trust: Beyond access controls

Security

Net-security

23.1.20

There is no easy fix to AI privacy problems

Security

Net-security

23.1.20

CIOs using AI to bridge gap between IT resources and cloud complexity

Security

Net-security

22.1.20

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

Security

Securityweek
22.1.20

Source Code Released for All ProtonVPN Apps

Security

Securityweek
21.1.20Realistic Factory Honeypot Shows Threats Faced by Industrial OrganizationsSecuritySecurityweek
21.1.20

Researchers create OT honeypot, attract exploits and fraud

Security

Net-security

21.1.20

DeepBlueCLI: Powershell Threat Hunting

Security

SANS

21.1.20

Data-driven vehicles: The next security challenge

Security

Net-security

21.1.20

Review: Enzoic for Active Directory

Security

Net-security

21.1.20

Techniques and strategies to overcome Kubernetes security challenges

Security

Net-security

21.1.20

Revenue from cloud IT infrastructure products declines

Security

Net-security

20.1.20

Business units and IT teams can no longer function in silos

Security

Net-security
19.1.20Google to Kill Chrome Apps Across All PlatformsSecurity

Bleepingcomputer

19.1.20

Google Chrome Aims to Make Browser User-Agents ObsoleteSecurity

Bleepingcomputer

18.1.20

Microsoft Introduces Free Source Code AnalyzerSecuritySecurityweek

18.1.20

Data Security Startup Cyral Emerges From Stealth ModeSecuritySecurityweek

18.1.20

News Wrap: PoC Exploits, Cable Haunt and Joker MalwareSecurity

Threatpost

18.1.20

Hack the Army bug bounty program paid $275,000 in rewardsSecuritySecurityaffairs
17.1.20Expert: Georgia Election Server Showed Signs of TamperingSecuritySecurityweek
17.1.20Siemens Warns of Security Risks Associated With Use of ActiveXSecuritySecurityweek

17.1.20

Microsoft Application Inspector: Check open source components for unwanted features

Security

Net-security

17.1.20Cloudflare Announces Free Security Services for Political CampaignsSecuritySecurityweek
17.1.20

White Ops appoints Rhushabh ‘Rush’ Mehta as Sr. VP of Engineering

Security

Net-security
16.1.20A Practical Guide to Zero-Trust SecuritySecurity

Threatpost

16.1.20Public Bug Bounty Program Launched for KubernetesSecuritySecurityweek
16.1.20Google Simplifies Enrollment Process for Advanced Protection ProgramSecuritySecurityweek
16.1.20

Embedding security, the right way

Security

Net-security

16.1.20

Six trends attracting the attention of enterprise technology leaders

Security

Net-security
16.1.20

Global security services industry to experience spend growth of more than $80 billion

Security

Net-security
15.1.20

Kubernetes bug bounty program open to anyone, rewards up to $10,000

Security

Net-security

15.1.20

Public Bug Bounty Takes Aim at Kubernetes Container ProjectSecurity

Threatpost

14.1.20

Security pitfalls to avoid when programming using an API

Security

Net-security

13.1.20

A case for establishing a common weakness enumeration for hardware security

Security

Net-security

13.1.20

Transact with trust: Improving efficiencies and securing data with APIs

Security

Net-security

12.1.20Microsoft Enables Security Defaults in Azure Active DirectorySecurity

Bleepingcomputer

10.1.20

More Data Exfiltration

Security

SANS

10.1.20

What students think about university data security

Security

Net-security

9.1.20

eBook: How Hackers Plan Their Attacks

Security

Net-security

8.1.20

Smart cities are on the rise, what are the dangers?

Security

Net-security
7.1.20Mimecast Acquires Threat Protection Provider SegasecSecuritySecurityweek
7.1.20Microsoft Access Files Could Include Unintentionally Saved Sensitive DataSecuritySecurityweek
7.1.20Are Overlapping Security Tools Adversely Impacting Your Security Posture?SecuritySecurityweek
6.1.20

Increase in Number of Sources January 3rd and 4th: spoofed

Security

SANS
6.1.20

Modern security product certification best practices

Security

Net-security
5.1.20BusKill, a $20 USB Dead Man’s Switch for Linux LaptopSecuritySecurityaffairs
4.1.20

Google Boots Security Camera Maker From Nest Hub After Private Images Go Public

Privacy  Security

Threatpost

1.1.20

"Nim httpclient/1.0.4"

Security

SANS

1.1.20

7 Tips for Maximizing Your SOC

Security

Threatpost

1.1.20

Starbucks Devs Leave API Key in GitHub Public Repo

Security

Bleepingcomputer