Not all managed security service providers are created equal. These questions can
There have been a lot of studies this year examining the cybersecurity
Mission-critical systems can’t just be switched off to apply security updates —
The bug is identified as CVE-2019-18408, a high-priority ‘use-after-free’ bug when dealing
How tying and measuring security investments to business impacts can elevate executives’
Spear phishing is the number one cyber-threat to organizations in the European
The end of the year is coming, and it’s time for security
Black Hat USA 2019, Rebecca Lynch ‘s ‘Woke Hiring Won’t Save Us: An Actionable Approach To Diversity Hiring And Retention’
Thanks to Black Hat for publishing the Black Hat 2019 tremendous conference
The New Year means new ways for cybercriminals to execute widespread cyberattacks on businesses and consumers, which opens the door for massive data breaches that …
More than half (54%) of cybersecurity professionals have expressed concerns that quantum computing will outpace the development of other security … Share! …
All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. …
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs. …
Seventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants. Share! …
Although SSLv3 has been considered obsolete and insecure for a long time, a large number of web servers still support its use. And even though …
Bullet-proof authentication is just a tap away! Share! …
You can’t rely on the words, intentions, or security measures of others to guard your company, customer and brand. Share! …
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his …
Archived News for the past 30 days
Microsoft says it doesn’t plan to provide security updates for the Microsoft Security Essentials component integrated into Windows 7 after the operating system reaches its
A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his
Crypto luminaries such as Vitalik Buterin have said that quantum computing—and the advent of Google’s “quantum supremacy”—is no threat to … Share!
A new variant of Vega ransomware family, dubbed Zeppelin, has recently been spotted in the wild targeting technology and healthcare companies across Europe, the United
An unprecedented connection between the North Korean APT and the crimeware giant spells trouble for global banks and other cybercrime targets. Share!
The Intel attack uses a similar technique that gamers commonly use to overclock their CPUs. Share!
Apple fixes bug that allows nearby hackers to render iPads and iPhones unusable. Share!
In November 2019, Kaspersky technologies successfully detected a Google Chrome 0-day exploit that was used in Operation WizardOpium attacks. During our investigation, we discovered that
The last Patch Tuesday of 2019 is finally here. Adobe today released updates for four of its widely used software—including Adobe Acrobat and Reader, Photoshop
The Council of the European Union sent a memo summarizing its thoughts on the “need to mitigate security risks linked to 5G”. Share!
The top 25 most dangerous errors found in the CVE repositories were just published, and they show some interesting and surprising trends over the past
Apparently, the evil just never stops at NordVPN… via h/tThe post NordVPN, Dipping Their Toes In The Evil End Of The Pool appeared first on
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security
As we begin our new decade of the 2020s, we can look back at the last 30 odd years and examine the collaboration between technology
The cybersecurity provider landscape is cluttered with impossible claims, misrepresentations, and a confusing mix of inconsistent terminology. Worse, every minute you delay making a decision
Amazon Web Services (AWS) at its recent re:Invent 2019 conference previewed two tools to advance cloud security and made available a tool that promises to
Cybersecurity researchers have spotted a new variant of the Snatch ransomware that first reboots infected Windows computers into Safe Mode and only then encrypts victims’
The key, only one-third the length of most commercial encryption keys, took more than 35 million compute hours to break. Share!
Microsoft users once again face threats from a new phishing attack. This time, the attackers have utilized a new strategy Microsoft Phishing Attack Bypasses Security
Criminals are using free certificate services to apply real security certs to fraudulent sites – and to take advantage of victims looking for surfing safety.
If you are a new student of White Hat hacking or Ethical Hacking course then you must have heard the term of Honeypot, which is
This has contributed hugely in putting the world at the mercy of hackers and data thefts who demand millions and yet end up betraying the
Ffuf – Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with Ffuf (Fuzz Faster U Fool)
I received another malicious Word document: with VBA macros and string obfuscation, launching a PowerShell downloader. As classic as they come. Share!
Copyright © 2002-2019 John Masserini. All rights reserved.