20 critical controls interactive from SANS
The SANS Institute released its 20 Critical Security Controls online interactive, a platform built to simplify the controls and let users choose how to consume them. The …
ESET Remote Administrator 4 released
ESET announced availability of ESET Remote Administrator 4 which simplifies the deploymen and management of ESET business solutions. Key features and benefits include: …
Phishing student loans’ pages target students
University students in the UK that have taken out a loan with the Student Loans Company have lately been targeted by a phishing scam that presents to them a page that is …
Gray Powell, the lost iPhone and malware
The story of the day is Gray Powell and the lost iPhone. I searched for him on Google and I was really surprised to see that 4 out of 10 results from Google’s first page …
Data integrity attacks a growing threat
A survey by Infosecurity Europe of 420 organizations has found that a quarter (28%) have been subject to a data integrity attacks. Of those that think that data integrity …
Network Solutions customers targeted by new hack attack
Only a week after a number of blogs hosted on Network Solutions have been compromised thanks to a WordPress hack, the company has been thrust back into the spotlight by a …
Splunk 4.1.1 brings 60+ fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
User access continues to be poorly managed
Findings gathered from a Ponemon Institute and Aveksa survey of 728 experienced IT practitioners at multinational corporations and government organizations show that …
Iceland volcano search results lead to fake AV
Eyjafj?¶ll, Eyjafjallaj?¶kull, Eyjafjalla, Eyjafjallajokull-¦ The Iceland volcano Eyjafjallaj?¶kull has been recently referred to by all those names in various media, …
Trojan disguised as Google Chrome extension
The announcement that Google Chrome is now the third most widely used browser wasn’t lost on cybercriminals. They follow the crowd, and that explains the recent …
Rogue software details: VirusOut
VirusOut is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …
OWASP releases list of top 10 web application risks
Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …
Featured news
Resources
Don't miss
- What managing partners should ask AI vendors before signing any contract
- Anthropic’s new AI model finds and exploits zero-days across every major OS and browser
- Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR
- The case for fixing CWE weakness patterns instead of patching one bug at a time
- Google study finds LLMs are embedded at every stage of abuse detection