Please turn on your JavaScript for this page to function normally.
Match
Researchers create system that predicts vulnerability severity from tweets

To what extent do users’ opinions about threat severity expressed online align with expert judgments and can these opinions provide an early indicator to help prioritize …

alert
Zero-day Chrome/Windows combo actively exploited in the wild

We now know why a number of Googlers made a point to urge users to implement the latest Chrome update as soon as possible: the vulnerability (CVE-2019-5786) is definitely …

Windows
Windows Servers in danger of being compromised via WDS bug

Checkpoint has released more details about CVE-2018-8476, a critical remote code execution vulnerability affecting all Windows Servers since 2008 SP2. The bug was responsibly …

Cisco switch
Users of Cisco switches, security appliances need to get patching

Administrators of Cisco switches, firewalls, and security appliances are advised to take a look at the latest collection of security advisories published by the company, as …

Chrome
Google plugs Chrome zero-day exploited in the wild

If you’re using Google’s Chrome browser and have not yet upgraded to the latest available version, do so now or risk being hit by attackers. About CVE-2019-5786 …

NSA unveils Ghidra reverse engineering tool at RSA Conference 2019

The National Security Agency (NSA) has released Ghidra, a free and cross-platform software reverse engineering tool suite used internally by the intelligence agency. They are …

face
Users are too confident in their protection from threats

Most users care about online privacy and take some steps to make sure their data is protected, a new Malwarebytes survey has revealed. But some protection measures are too …

Chronicle creates Backstory, a cloud service for analyzing enterprises’ security data

Chronicle, the cybersecurity subsidiary of Alphabet (Google’s parent company), has announced Backstory, a cloud platform that can be used by enterprises to sift through …

programmer
Traditional cybersecurity staff retention tactics becoming less effective

The recipe for improving your organization’s ability to hire and retain cybersecurity professionals is relatively straightforward (if not easy): offer an attractive pay, …

bug
Bug in Cobalt Strike pentesting tool used to identify malicious servers

An extraneous space in the HTTP responses of webservers run by a variety of malicious actors allowed Fox-IT researchers to identify them pretty easily for the past year and a …

businessman
Phishing, software supply chain attacks greatest threats for businesses

Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more …

cisco small business router
Cisco SOHO wireless VPN firewalls and routers open to attack

Cisco has released security fixes for several models of wireless VPN firewalls and routers, plugging a remote code execution flaw (CVE-2019-1663) that can be triggered via a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools