Please turn on your JavaScript for this page to function normally.
Armor
Armor Anywhere: Managed security for any cloud

As growing businesses increasingly rely on public, private and hybrid cloud platforms in addition to internal infrastructures, at Armor is launching Armor Anywhere to keep …

Nishang
Nishang: Using PowerShell for penetration testing

Nishang is a framework, and a collection of scripts and payloads which enables PowerShell usage for offensive security, penetration testing and red teaming. The tool is the …

Needle
Needle iOS security testing tool to be unveiled at Black Hat Arsenal

In a session at Black Hat USA 2016 on Wednesday, Marco Lancini, Security Consultant at MWR InfoSecurity, will demonstrate publicly for the first time a new iOS security …

ThreatPath
Visibility and assessment of vulnerable attack paths

Attivo Networks announced that its ThreatMatrix Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack …

IOActive
IOActive offers offensive security approach to risk assessment

IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …

Infection Monkey
Infection Monkey: Test a network from an attacker’s point of view

Infection Monkey, a tool designed to test the resiliency of modern data centers against cyber attacks, was developed as an open source tool by GuardiCore’s research …

magnify look search
Global network shares phishing attack intelligence in real-time

IRONSCALES, a multi-layered phishing mitigation solution that combines human intelligence with machine learning, today announced the launch of Federation, a product that will …

Black Hat USA 2016
Three topics everyone will be talking about at Black Hat USA 2016

There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

bomb
Cybersecurity concern continues to rise

A new Black Hat report reveals some critical concerns about the information security industry and emerging cyber risks faced by today’s enterprises. In 2015, Black Hat …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

iPhone
SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Don't miss

Cybersecurity news