Please turn on your JavaScript for this page to function normally.
Bluetooth
Bluetooth vulnerability allows snooping of traffic between paired devices

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …

Change Healthcare gives payers and providers the keys to cloud security

Change Healthcare is providing healthcare leaders the keys to cloud security with Change Healthcare Security Management, which includes a “Bring Your Own Key” …

Rapid7 integrates with Microsoft Azure to provide visibility, analytics, and automation for cloud security

Rapid7 announced integration between Rapid7’s Insight platform and Microsoft Azure. This integration provides vulnerability management, analytics-driven incident detection for …

Microsoft logo
Microsoft offers bug bounties for holes in its identity services

Microsoft is asking security researchers to look for and report technical vulnerabilities affecting its identity services and OpenID standards implementations, and is offering …

Microsoft impersonate
Microsoft tops list of brands impersonated by phishers

The number one brand spoofed by phishers in Q2 2018 in North America was Microsoft, says email security company Vade Secure. The company credits the surging of adoption of …

SoftwareONE launches Security for Microsoft 365

SoftwareONE announced that it has launched Security for Microsoft 365, a managed service that enhances the security of Microsoft 365 environments as well as manages and …

ClearDATA launches healthcare compliant cloud offering on Microsoft Azure

ClearDATA has launched a healthcare compliant offering for Microsoft Azure. The offering helps healthcare organizations operating on Azure to innovate and scale while …

patch
Microsoft plugs 53 security holes in July 2018 Patch Tuesday

For its July 2018 Patch Tuesday, Microsoft has patched 53 vulnerabilities. 17 of them are critical and 16 of those affect Internet Explorer and Edge. Microsoft updates …

Windows
Is Windows ShimCache a threat hunting goldmine?

Enterprise-wide threat hunting sounds like a daunting task and for inexperienced forensic analysts it certainly can be. However, there are various techniques that can be used …

patch
July 2018 Patch Tuesday forecast: The fireworks and the finale

Patch management is kind of like fireworks around the fourth of July. Momentary excitement with lulls that repeat several times until the culminate in a finale! Well there are …

tools
How connected and secure is the modern workplace?

In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …

eye
How Facebook and Google nudge users to make anti-privacy choices

Facebook, Google and Microsoft use design techniques and tricks to steer users toward sharing more information about themselves to benefit those businesses, the Norwegian …

Don't miss

Cybersecurity news