Expert corner

 
 
(IN)SECURE Magazine
Sqrrl

Sqrrl empowers threat hunters with self-service analytics

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package rigid algorithms. Sqrrl Enterprise 2.8 introduces the ability for …

binary

Two Foxit Reader RCE zero-day vulnerabilities disclosed

Trend Micro’s Zero Day Initiative has released details about two remote code execution zero-day flaws affecting popular freemium PDF tool Foxit Reader. The first one (CVE-2017-10951) is a command injection flaw that exists within the …

gear

New infosec products of the week​: August 18, 2017

New Firebox M Series appliances help SMBs keep up with encrypted traffic WatchGuard Technologies announced hardware upgrades to its Firebox M Series to handle the proliferation of encrypted web traffic. With the new M470, M570 and M670 …

door

How security pros look at encryption backdoors

The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of government-mandated encryption backdoors. 72 percent of the …

Don't miss

Malware news

Black Hat USA 2017

 
(IN)SECURE Magazine