skip to main content
Close Icon We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By continuing to use the website, you consent to our use of cookies.
Explore more Hot Topics
Showing results for
  • All (348)
  • Media (300)
  • Research (25)
  • Events (9)
  • Brands (6)
  • Training (5)
  • Press Release (3)

Security Now

A digital community dedicated to helping businesses keep one step ahead of their ever-changing cybersecurity concerns. Read More

A digital community dedicated to helping businesses keep one step ahead of their ever-changing cybersecurity concerns. Read More

Building a Security Culture

  • 14 November 2019 | Veracode | InformationWeek

Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More

Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More

An ICS Security Checklist

  • 21 January 2020 | Brian Buntz | IoT World Today

Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More

Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More

Dangerous 'RIPlace' Exploit Able to Bypass AV & EDR Protections

  • 26 November 2019 | Larry Loeb | Security Now

Researchers discover way that ransomware can bypass the protections which operating system vendors have built into their products. Read More

Researchers discover way that ransomware can bypass the protections which operating system vendors have built into their products. Read More

Complex Q3 DDoS Can Have 11 Attack Vectors

  • 05 November 2019 | Larry Loeb | Security Now

Link 11 has issued a summary of what they have found out about characteristics of DDoS attacks that occurred in Q3 2019. Read More

Link 11 has issued a summary of what they have found out about characteristics of DDoS attacks that occurred in Q3 2019. Read More

Building Your Secure Cloud-Ready Branch

  • 05 November 2019 | Nirav Shah | Security Now

Many organizations are developing a cloud-ready branch strategy that relies on SD-WAN to enable direct Internet access for fast cloud access and improved cloud application performance. Read More

Many organizations are developing a cloud-ready branch strategy that relies on SD-WAN to enable direct Internet access for fast cloud access and improved cloud application performance. Read More

Study Finds Customer Data to Be Most at Risk From Insiders

  • 06 November 2019 | Larry Loeb | Security Now

Companies say that they are somewhat more worried about inadvertent insider breaches and negligent data breaches than they are about malicious intent by bad actors. Read More

Companies say that they are somewhat more worried about inadvertent insider breaches and negligent data breaches than they are about malicious intent by bad actors. Read More

MSFT Jumps on DoH

  • 20 November 2019 | Larry Loeb | Security Now

Microsoft has announced that an upcoming version of Windows 10 will have support for DNS over HTTPS. Read More

Microsoft has announced that an upcoming version of Windows 10 will have support for DNS over HTTPS. Read More

How PureLocker Ransomware Bypasses AV Checks

  • 13 November 2019 | Larry Loeb | Security Now

Intezer and IBM X-Force have found a new ransomware targeted at production servers. And it's sneaky... Read More

Intezer and IBM X-Force have found a new ransomware targeted at production servers. And it's sneaky... Read More

'Quantum Dawn' Raid as Financial Industry Simulates Global Ransomware Attack

  • 08 November 2019 | Larry Loeb | Security Now

Financial institutions in Asia, the US and the UK are put through their paces. Read More

Financial institutions in Asia, the US and the UK are put through their paces. Read More

DePriMon: A New & Unique Way to Download Malware

  • 25 November 2019 | Larry Loeb | Security Now

ESET calls it 'a powerful, flexible and persistent tool.' Read More

ESET calls it 'a powerful, flexible and persistent tool.' Read More

TCP DDoS Reflection Attacks on the Rise

  • 12 November 2019 | Larry Loeb | Security Now

Radware report picks up on a change in attacker strategy. Read More

Radware report picks up on a change in attacker strategy. Read More

Cheap Phone Has Cheap Security

  • 09 January 2020 | Larry Loeb | Security Now

Phone looks a steal a $35 but it comes with free, pre-installed malware! Read More

Phone looks a steal a $35 but it comes with free, pre-installed malware! Read More

The Top 25 Most Dangerous Software Errors

  • 29 November 2019 | Larry Loeb | Security Now

'Improper Restriction of Operations within the Bounds of a Memory Buffer' tops this year's list. Read More

'Improper Restriction of Operations within the Bounds of a Memory Buffer' tops this year's list. Read More

5G Security Rests on an Unstable Base

  • 23 December 2019 | Larry Loeb | Security Now

Positive Technologies has issued a report on the emerging security problems of 5G signaling networks. Read More

Positive Technologies has issued a report on the emerging security problems of 5G signaling networks. Read More

Crystal Ball: The Top 3 Global Cybersecurity Threats for 2020

  • 23 December 2019 | Larry Loeb | Security Now

In the year ahead, organizations of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected, high-impact cybersecurity events. Read More

In the year ahead, organizations of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected, high-impact cybersecurity events. Read More

Problems With EU Payment Security Persist

  • 14 November 2019 | Oliver Schonschek | Security Now

Proposed new security procedures within the EU have troubled some payment service providers, leading to the postponement of their implementation. Read More

Proposed new security procedures within the EU have troubled some payment service providers, leading to the postponement of their implementation. Read More

Keeping It Real Can Pay Off for Old-School Attacks

  • 14 November 2019 | Larry Loeb | Security Now

Even a previously known attack can fool the security team if it is well crafted. Read More

Even a previously known attack can fool the security team if it is well crafted. Read More

Cloud Monitoring: The New 'Alert Overload' Problem & How to Fix It

  • 08 January 2020 | Joe Vadakkan | Security Now

While cloud computing offers a variety of proven business benefits, from a security perspective, IT teams are often still wavering in uncharted territory - and cloud monitoring is one such area. Read More

While cloud computing offers a variety of proven business benefits, from a security perspective, IT teams are often still wavering in uncharted territory - and cloud monitoring is one such area. Read More

Hardware Is the New Attack Surface – Forrester

  • 12 December 2019 | Security Now

Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting. Read More

Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting. Read More

Artisans & Commercials Gang Up on Third Parties

  • 22 November 2019 | Larry Loeb | Security Now

Cybersecurity and intelligence firm AdvIntel has reported about a trend it has seen happening in the ransomware arena. Read More

Cybersecurity and intelligence firm AdvIntel has reported about a trend it has seen happening in the ransomware arena. Read More

Two Threat Actors, One Targeted Threat

  • 22 October 2019 | Larry Loeb | Security Now

By combining, two threat actors leveraged their own specific areas of expertise into one highly efficient – and private &ndash tool. Read More

By combining, two threat actors leveraged their own specific areas of expertise into one highly efficient – and private &ndash tool. Read More

What's New in the EU Security Market

  • 18 October 2019 | Oliver Schonschek | Security Now

This October we visited the trade fair it-sa, which counts as one of the more important IT security exhibitions in the world. They hosted more than 750 security vendors from 25 countries who presented their solutions for the international market. Read More

This October we visited the trade fair it-sa, which counts as one of the more important IT security exhibitions in the world. They hosted more than 750 security vendors from 25 countries who presented their solutions for the international market. Read More

Researcher Proven Right, but It Took 10 Years

  • 07 January 2020 | Larry Loeb | Security Now

After a decade of trying, security researcher Thierry Zoller has finally seen the generalized vulnerability he found in some AV products patched. Read More

After a decade of trying, security researcher Thierry Zoller has finally seen the generalized vulnerability he found in some AV products patched. Read More

Zero-Day Vulnerabilities Discovered in Enterprise-Grade VPN

  • 06 December 2019 | Larry Loeb | Security Now

Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour. Read More

Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour. Read More

Operational Technology Players Come Out of the Shadows

  • 23 October 2019 | Larry Loeb | Security Now

Operational technology (OT) has long been hiding in the factories and sites of industrial installations, but things are changing. Read More

Operational technology (OT) has long been hiding in the factories and sites of industrial installations, but things are changing. Read More

Cylance Discovers WAV Files Can Hide Malware

  • 21 October 2019 | Larry Loeb | Security Now

BlackBerry Cylance threat researchers Anuj Soni, Jordan Barth and Brian Marks recently discovered obfuscated malware code that was embedded within WAV audio files. Read More

BlackBerry Cylance threat researchers Anuj Soni, Jordan Barth and Brian Marks recently discovered obfuscated malware code that was embedded within WAV audio files. Read More

Spear Phishing: Don't Rise to the Bait, Says Microsoft

  • 04 December 2019 | Larry Loeb | Security Now

Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media. Read More

Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media. Read More

Europe Starts to Build Its Own Secure Cloud

  • 05 December 2019 | Oliver Schonschek | Security Now

The German Federal Government wants to join forces with other European partners to create a secure cloud for Europe called GAIA-X. Read More

The German Federal Government wants to join forces with other European partners to create a secure cloud for Europe called GAIA-X. Read More

False Training Information Can Dupe Machine Learning Models

  • 27 November 2019 | Larry Loeb | Security Now

Researchers from Boston University have shown how really small amounts of disinformation can taint the learning process used by many AI programs. Read More

Researchers from Boston University have shown how really small amounts of disinformation can taint the learning process used by many AI programs. Read More

  of

no results found.