
New infosec products of the week: March 3, 2017
Nehemiah Security’s AtomicEye RQ quantifies the effects of cyber exploits Nehemiah Security released AtomicEye RQ (Risk Quantifier). Engineered to replicate a network …

The evolution of cloud and mobile security
In this podcast recorded at RSA Conference 2017, Salim Hafid, Product Marketing Manager at Bitglass, talks about how organizations are dealing with BYOD, cloud security, and …

The agile IT stack grows and becomes more complex
BigPanda’s annual survey evaluated the current IT monitoring landscape, including a review of the most popular tools for monitoring, deployment, and ticketing/collaboration; …

Yahoo cookie-forging incident affected 32 million accounts
We finally know how many user accounts were affected by last year’s Yahoo cookie-forging incident: 32 million. What happened? “In November and December 2016, we …

132 compromised apps removed from Google Play
Google has recently removed 132 Android apps from Google Play due to them containing in their local HTML pages hidden iFrames linking to malicious domains. But even though …

Chrome users on macOS to see more dangerous site warnings
MacOS users who use Chrome to surf the web are likely to see more security warnings in the coming days, as Google’s Safe Browsing service will start flagging sites …

Multiple security flaws found in mainstream robotic technologies
IOActive exposed numerous vulnerabilities found in multiple home, business, and industrial robots available on the market today. The array of vulnerabilities identified in the …

Ransomware spiked 752% in new families
2016 was truly the year of online extortion. Cyber threats reached an all-time high, with ransomware and Business Email Compromise (BEC) scams gaining increased popularity …

Capsule8: Container-aware real-time threat protection
Despite massive adoption of Linux in the enterprise, there has been no world-class security offering for Linux infrastructure — until now. In this podcast recorded at RSA …

Attackers thrive in a fluid market, while bureaucracy constrains defenders
A new global report from Intel Security and the Center for Strategic and International Studies (CSIS) reveals three categories of misaligned incentives: corporate structures …

Email and IoT security issues persist
New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …

Fighting sophisticated phishing threats during the digital revolution
In this podcast recorded at RSA Conference 2017, Damien Hugoo, Director of Product Marketing at Easy Solutions, talks about what organizations can do in order to take a …
Featured news
Resources
Don't miss
- The many variants of the ClickFix social engineering tactic
- Yet another SonicWall SMA100 vulnerability exploited in the wild (CVE-2025-32819)
- How agentic AI and non-human identities are transforming cybersecurity
- Even the best safeguards can’t stop LLMs from being fooled
- Wave of tech layoffs leads to more job scams