Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.
A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.
Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...
Recent cyber attacks on government and private sector businesses along with the rapid proliferation of malware such as Conficker and Zeus, have shown how...
The Recovery Accountability and Transparency Board announced today that Recovery.gov has moved to a cloud computing infrastructure, a technology that will allow for more...
SecurityWeek staff has confirmed that portable storage, authentication, and trusted virtual computing solutions provider, IronKey, has raised $22 million in venture capital funding.
Verizon and Novell have teamed up to provide “Secure Access Services from Verizon” – an on-demand identity and access management service providing enterprise clients...
North Korean hackers working for the government stole virtual assets last year estimated to be worth between $630 million and more than $1 billion, U.N. experts...