searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Black Hat USA 2019

Get our top stories in your inbox

What’s cybercriminals’ most effective weapon in a ransomware attack?

August 7, 2019

Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …

Capsule8 announces multimillion-dollar investment from Intel Capital

August 7, 2019

Capsule8 announced a multimillion-dollar investment from Intel Capital. The rapidly growing company will apply the funds to drive a range of sales, marketing, product …

Warshipping: Attackers can access corporate networks through the mailroom

August 7, 2019

Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …

Digital Guardian launches DG Wingman, a new free forensic artifact collection tool for security pros

August 7, 2019

Digital Guardian announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, …

Kiuwan’s application security testing platform helps teams realize DevSecOps goals

August 7, 2019

Kiuwan, a provider of application security testing tools, announced the availability of free software vulnerability scan trials for the US market, with live demonstrations at …

BlackBerry Intelligent Security enhances mobile endpoint security in zero trust environments

August 7, 2019

BlackBerry announced the launch of BlackBerry Intelligent Security, the first cloud-based solution that leverages the power of adaptive security, continuous authentication and …

Cloudentity OIDC Authorization Platform enhances data privacy and PII protection

August 7, 2019

Cloudentity, a leader in cloud Identity and enforcement for Users, Services and Things, announced the release of its next generation OIDC Authorization Platform that provides …

Qualys bringing new prescription for security to Black Hat and DEF CON 2019

August 7, 2019

At this year’s Black Hat, Qualys is bringing a new prescription for security — the company is providing its Global IT Asset Discovery and Inventory application to businesses …

Blue Hexagon’s new ability inspects encrypted traffic in real-time

August 7, 2019

Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden …

Stellar Cyber unveils Starlight 3.3, a data- and AI-based security analytics solution

August 7, 2019

Security analytics provider Stellar Cyber announced the launch of Starlight 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based …

LogicHub’s new capabilities assist security operations teams with codifying intelligent decision-making

August 7, 2019

LogicHub, the provider of the industry’s most complete security automation platform, announced new capabilities that assist security operations teams with codifying …

SWAPGS Attack: A new Spectre haunts machines with Intel CPUs

August 7, 2019

Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …

Posts navigation

1 2 3 4 5 6

Featured news

  • Overcoming obstacles to introduce zero-trust security in established systems
  • Leveraging network automation to enhance network security
  • Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
Guide: Aligning your security program with the NIST CSF

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Overcoming obstacles to introduce zero-trust security in established systems

Leveraging network automation to enhance network security

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

3CX customers targeted via trojanized desktop app

The rise of biometrics and decentralized identity is a game-changer for identity verification

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us