Black Hat USA 2017
Security vulnerabilities in radiation monitoring devices
IOActive researcher Ruben Santamarta has uncovered a number of cybersecurity vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs), and has presented his …
22% of SMBs hit by ransomware had to cease business operations
More than one-third of small and medium-sized businesses have experienced a ransomware attack in the last year, a new Malwarebytes report claims, and 22 percent of these …
Lippizan: Sophisticated, targeted spyware on Google Play
Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed …
Most companies fail to measure cybersecurity effectiveness
Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …
Self-service perimeter security for the hybrid cloud
Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service …
Defensive AI system implements strategies from the best analysts
Champion Technology Company, developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology …
Photo gallery: Black Hat USA 2017
Black Hat USA 2017 is underway at Las Vegas, and here are a few photos from the Business Hall and the Arsenal. Featured companies: Forcepoint, Qualys, LookingGlass, Vectra …
90% of consumers think security should be built into smart devices
90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …
Win a security gap assessment from NTT Security at Black Hat
This year at Black Hat 2017, NTT Security is focusing on incident response readiness: one lucky show participant will win a thorough security gap assessment from the NTT …
Malware creators increasingly run their business like legitimate software companies
The continuing increase in ransomware attacks is, partly, due to how easy the malware can be built and used by attackers that have limited technical skills. Take for example …
Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …
Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …
Featured news
Sponsored
Don't miss
- Beware of phishing emails delivering backdoored Linux VMs!
- Google patches actively exploited Android vulnerability (CVE-2024-43093)
- Open-source software: A first attempt at organization after CRA
- Maximizing security visibility on a budget
- Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)