Please turn on your JavaScript for this page to function normally.
ransomware
What’s cybercriminals’ most effective weapon in a ransomware attack?

Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …

money
Capsule8 announces multimillion-dollar investment from Intel Capital

Capsule8 announced a multimillion-dollar investment from Intel Capital. The rapidly growing company will apply the funds to drive a range of sales, marketing, product …

Warshipping: Attackers can access corporate networks through the mailroom

Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …

Abstract
Digital Guardian launches DG Wingman, a new free forensic artifact collection tool for security pros

Digital Guardian announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, …

Magnify
Kiuwan’s application security testing platform helps teams realize DevSecOps goals

Kiuwan, a provider of application security testing tools, announced the availability of free software vulnerability scan trials for the US market, with live demonstrations at …

mobile device
BlackBerry Intelligent Security enhances mobile endpoint security in zero trust environments

BlackBerry announced the launch of BlackBerry Intelligent Security, the first cloud-based solution that leverages the power of adaptive security, continuous authentication and …

lock
Cloudentity OIDC Authorization Platform enhances data privacy and PII protection

Cloudentity, a leader in cloud Identity and enforcement for Users, Services and Things, announced the release of its next generation OIDC Authorization Platform that provides …

Qualys
Qualys bringing new prescription for security to Black Hat and DEF CON 2019

At this year’s Black Hat, Qualys is bringing a new prescription for security — the company is providing its Global IT Asset Discovery and Inventory application to businesses …

binary
Blue Hexagon’s new ability inspects encrypted traffic in real-time

Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden …

analytics IT assets
Stellar Cyber unveils Starlight 3.3, a data- and AI-based security analytics solution

Security analytics provider Stellar Cyber announced the launch of Starlight 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based …

gear
LogicHub’s new capabilities assist security operations teams with codifying intelligent decision-making

LogicHub, the provider of the industry’s most complete security automation platform, announced new capabilities that assist security operations teams with codifying …

Intel CPU
SWAPGS Attack: A new Spectre haunts machines with Intel CPUs

Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …

Don't miss

Cybersecurity news