Please turn on your JavaScript for this page to function normally.
Global hacker competition challenges penetration testers

More than 500 players have registered for an exciting global online hacker challenge taking place this week during Black Hat USA 2015 and DEF CON.Organized by BalaBit, best …

Attackers use Google Drive, Dropbox to breach companies

A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …

Qualys announces free global asset inventory service

At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on …

CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015

CDNetworks, the global content delivery network (CDN), will showcase Cloud Security 2.0 this week at Black Hat USA 2015, Booth IP29.Cloud Security 2.0 includes intelligent, …

The state of the mobile ecosystem

At Black Hat USA 2015, Appthority released their second Q2 2015 Enterprise Mobile Threat Report, for which their researchers analyzed security and risky behaviors in three …

API security becoming a CXO level concern

Today at Black Hat USA 2015, Akana released the findings of a survey of over 250 security practitioners, including CSOs, CISOs, and security architects.Aimed at quantifying …

Vulnerability and configuration management for Amazon Web Services

Alert Logic revealed at the Black Hat USA 2015 conference Alert Logic Cloud Insight, a cloud-native vulnerability and configuration management solution designed for customers …

Chinese APTs use commercial VPN to hide their attack activity

A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …

MatrixSSL Tiny: A TLS software implementation for IoT devices

INSIDE Secure announced the availability of MatrixSSL Tiny, the world’s smallest Transport Layer Security (TLS) software implementation, to allow companies to affordably …

Open source tool for deploying SSL public key pinning in iOS, OS X apps

At Black Hat USA 2015, Data Theorem and Yahoo! will be unveiling TrustKit, a new, open source security toolkit that helps developers easily include complex mobile security …

Quantum-powered RNG supplies pure entropy to crypto systems

Whitewood Encryption Systems has created Entropy Engine, a cost-effective, quantum-powered random number generator.The Entropy Engine employs quantum mechanics to solve the …

79% of companies release apps with known vulnerabilities

The application development process is rampant with security risks due to current business pressures, according to new research released at Black Hat USA 2015 by Prevoty. From …

Don't miss

Cybersecurity news