Latest trends in the ransomware business
“Cybercrooks wielding ransomware might prefer getting paid in Bitcoin, but the crypto currency is just a way to obfuscate the real destination of the payment – as …
Photos: RSA Conference 2015, part 5
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: Bleuliv, Entrust Datacard, Palo Alto Networks, Bitglass, Duo …
IBM brings cyber threat analytics to the cloud
IBM announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real …
Cyphort combines APT detection with lateral movement
At RSA Conference 2015, Cyphort announced the availability of Cyphort Advanced Threat Defense Platform 3.3, which includes malware lateral movement detection, the ability to …
WordPress issues critical security release
WordPress users should update as soon as possible, as the latest release (4.1.2) plugs a critical cross-site scripting vulnerability that could allow anonymous users to …
Network discovery and visibility for massive enterprise networks
At RSA Conference 2015, Auconet unveiled its new Enterprise Security Foundation (ESF) that fortifies security for both partners and enterprises. ESF provides third-party …
Adding context to security data to achieve visibility into attacks
At RSA Conference 2015, RSA announced new capabilities have been added to its Security Analytics solution, which is engineered to give organizations the necessary context to …
Photos: RSA Conference 2015, part 4
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: BalaBit, Tenable Security, Qualys, Websense, Titus, Splunk, Cybereason.
Card skimming gang stole 3M euros using ghost PoS terminals
French police supported by Europol’s European Cybercrime Centre (EC3) have arrested 18 members of a criminal gang who were illegally using modified, ’ghost’ …
Microsoft announces bug bounties for Spartan, Azure
As the official launch of Windows 10 approaches, Microsoft has launched a new bug bounty related to its Technical Preview version, and is asking bug hunters to analyze its new …
Banking botnets persist despite takedowns
In order to provide organizations insight into the most insidious and pervasive banking botnets currently being used to target financial institutions and their clients, Dell …
Vulnerability management for over 15,000 unique apps
Tripwire announced at RSA Conference 2015 that its Tripwire IP360 solution now discovers more than 100,000 conditions, including vulnerabilities, configurations and operating …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services