Please turn on your JavaScript for this page to function normally.
users
Qualys and Bugcrowd bring automation, crowdsourcing to web app security

At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …

Qualys
Qualys brings web application security automation to a new level

At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …

Tesco Bank card
Did Tesco Bank attackers guess victims’ payment card details?

A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …

lights
Key causes of network outages and vulnerabilities

A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …

gear
Security orchestration and automation: Closing the gap in incident response

Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

Car
US gets federal guidelines for safe deployment of self-driving cars

The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …

Danger
Macro-based malware evolves to bypass traditional defenses

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …

gear
Automation isn’t one-size fits all

It’s no secret that security teams are understaffed despite increased pressure to deliver. Firewall engineers face an additional challenge when it comes to access request …

threat hunting
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge

Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

DARPA Cyber Grand Challenge
Can a computer system compete against human CTF experts?

DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …

Building
Weak default credentials, command injection bug found in building operation software

A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …

phantom
Phantom named RSA Conference 2016’s Most Innovative Startup

RSA Conference has named Phantom “RSAC Most Innovative Startup 2016″ in its Innovation Sandbox Contest. A panel of venture capitalists, entrepreneurs and large security …

Don't miss

Cybersecurity news