Black Hat USA 2019
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
What’s cybercriminals’ most effective weapon in a ransomware attack?
Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Capsule8 announces multimillion-dollar investment from Intel Capital
Capsule8 announced a multimillion-dollar investment from Intel Capital. The rapidly growing company will apply the funds to drive a range of sales, marketing, product …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093656/delivery-packet-400x200.jpg)
Warshipping: Attackers can access corporate networks through the mailroom
Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194417/abstract-dark-400x200.png)
Digital Guardian launches DG Wingman, a new free forensic artifact collection tool for security pros
Digital Guardian announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
Kiuwan’s application security testing platform helps teams realize DevSecOps goals
Kiuwan, a provider of application security testing tools, announced the availability of free software vulnerability scan trials for the US market, with live demonstrations at …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101842/mobile_device-400x200.jpg)
BlackBerry Intelligent Security enhances mobile endpoint security in zero trust environments
BlackBerry announced the launch of BlackBerry Intelligent Security, the first cloud-based solution that leverages the power of adaptive security, continuous authentication and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103503/lock-dark-400x200.jpg)
Cloudentity OIDC Authorization Platform enhances data privacy and PII protection
Cloudentity, a leader in cloud Identity and enforcement for Users, Services and Things, announced the release of its next generation OIDC Authorization Platform that provides …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101335/Qualys3-400x200.jpg)
Qualys bringing new prescription for security to Black Hat and DEF CON 2019
At this year’s Black Hat, Qualys is bringing a new prescription for security — the company is providing its Global IT Asset Discovery and Inventory application to businesses …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
Blue Hexagon’s new ability inspects encrypted traffic in real-time
Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden …
![analytics IT assets](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113947/analytics-400x200.jpg)
Stellar Cyber unveils Starlight 3.3, a data- and AI-based security analytics solution
Security analytics provider Stellar Cyber announced the launch of Starlight 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based …
![gear](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110730/gear-400x200.jpg)
LogicHub’s new capabilities assist security operations teams with codifying intelligent decision-making
LogicHub, the provider of the industry’s most complete security automation platform, announced new capabilities that assist security operations teams with codifying …
![Intel CPU](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195036/intel-cpu-400x200.jpg)
SWAPGS Attack: A new Spectre haunts machines with Intel CPUs
Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege