Help Net Security
Russian APT group actively exploiting Flash, Windows 0-day flaws
APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …
Organizations continue to rely on outdated technologies
TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …
Radware launches hybrid cloud based WAF service
Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …
Five misunderstandings about cloud storage
Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is …
BlackVault CYNR: Code and document signing appliance
Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …
The portable secure desktop: tVolution Mini
At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart …
Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches
Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …
How IT pros protect and investigate their endpoints
More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. …
1 in 4 employees enable cloud attacks
While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …
Security analytics: The key for breach detection?
Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced …
IBM unveils cyber threat intelligence sharing platform
IBM is making its vast library of security intelligence data available via the IBM X-Force Exchange, a new cyber threat intelligence sharing platform powered by IBM Cloud. …
Internet of Everything attack surface grows
The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …
Featured news
Resources
Don't miss
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years