Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google researcher Tavis Ormandy has identified a new vulnerability in the LastPass browser extension. LastPass is working on a fix [Read More]
Russia-linked threat group known as APT29 and Cozy Bear used domain fronting to disguise Tor traffic [Read More]
Vulnerabilities found in the Chrome and Firefox extensions of the LastPass password manager allow attackers to steal passwords, execute code [Read More]
White hat hackers earned tens of thousands of dollars for finding critical vulnerabilities in GitHub Enterprise [Read More]
Vulnerability in the web versions of WhatsApp and Telegram allowed hackers to hijack accounts by sending a malicious file to the targeted user [Read More]
Cybercriminals have been stealing payment card data from Magento stores by hijacking a payments extension [Read More]
CIA responds to WikiLeaks Vault 7 dump: it’s our job to be innovative and cutting-edge, but we don’t spy on fellow Americans [Read More]
Researchers found several potentially serious flaws in a popular pricing software from Navetti. Patches are available [Read More]
Number of dark web services dropped significantly following the cyberattack on Freedom Hosting II [Read More]
The Shamoon 2.0 malware has a fully functional ransomware module, but it has not been used in attacks [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.