M&A Tracker
Researchers have spotted a Nuclear exploit kit attack in which new Flash Player exploits are automatically generated throughout the day in an effort to...
Hi, what are you looking for?
Enterprise cybersecurity giant Proofpoint is buying Germany-based Microsoft 365 security solutions provider Hornetsecurity.
Researchers have spotted a Nuclear exploit kit attack in which new Flash Player exploits are automatically generated throughout the day in an effort to...
Taiwan-based network attached storage (NAS) company Synology has released software updates to address several vulnerabilities reported by Dutch security company Securify.
Researchers at Dutch software security company Securify have identified a total of eight vulnerabilities in EMC M&R and EMC Secure Remote Services.
As cliché as the saying is, it is quite true that we live in a global world. It’s not uncommon for a large enterprise...
Malicious actors could theoretically shut down more than 5,300 gas stations in the United States because the automatic tank gauges (ATGs) used to monitor...
A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...
Researchers at FireEye have issued a report on an attack group targeting C-level executives to get insider information that could be used to gain...
In a broad agency announcement published last week, the Defense Advanced Research Projects Agency (DARPA) informed researchers that it is looking for innovative proposals...
As organizations worldwide become more and more aware of the risks posed by the lack of protection against cyber threats, information security spending will...
Technology mergers and acquisitions (M&A) soared by 57% year-over-year in the second quarter of 2014 and IT security has played an important role in...
It’s rare to hear about a startup that has been able to secure its Series A, B and C rounds while operating in stealth...
NIST to Develop Cybersecurity Testbed for ICSThe National Institute of Standards and Technology (NIST) is seeking information to build a reconfigurable cybersecurity testbed for...
Cybercriminals have developed a new Trojan largely based on Gameover Zeus in an effort to revive the botnet that was recently disrupted by international...
Mergers and acquisitions make for a busy time for businesses. Unfortunately for them, they can also be a busy time for attackers. According to...
In an effort to enhance its secure enterprise mobility offerings, Good Technology announced on Sunday that it has signed a definitive agreement to acquire...
Cybersecurity services firm KEYW Corporation (NASDAQ: KEYW) announced after the bell on Thursday that it would acquire Sensage, Inc., a Redwood City, California-based provider...
Juniper Networks today announced that it has acquired Mykonos Software, a security startup that provides technology that uses deception to detect and confuse attackers....
From my perspective, there are two Internets. The one common folks use - you know, for surfing, stalking and finding who played first base...
Raytheon Expands Cyber Security Capabilities With Acquisition of Henggeler Computer Consultants Defense contractor Raytheon continues to gobble up cyber security services firms, today announcing...
FishNet Security announced today that it has acquired Logic Trends Inc., a provider of identity and access management solutions.Founded in 2002, Roswell, Georgia-based Logic...