
Researchers use power lines to exfiltrate data from air-gapped computers
Researchers from the Ben-Gurion University of the Negev have come up with another way to exfiltrate data from air-gapped computers: this time, it’s via malware that can …

Court rules to ban access to Telegram in Russia
It didn’t take long for judge Yuliya Smolina of the Tagansky District Court of Moscow to rule that the Telegram secure messaging service should be blocked on the whole …

Protect and manage secure company files with Vera’s agentless solution
Vera is taking the next step to a truly agentless experience by giving customers the ability to edit, collaborate, and save changes to secure files without requiring any …

Onapsis raises $31 million Series C funding for ERP cybersecurity
Onapsis, the global experts in business-critical application cybersecurity and compliance, today announced a $31 million Series C minority funding round led by new investor …

Thousands of WP, Joomla and SquareSpace sites serving malicious updates
Thousands of compromised WordPress, Joomla and SquareSpace-based sites are actively pushing malware disguised as Firefox, Chrome and Flash Player updates to visitors. This …

One in 10 C-level execs say GDPR will cost them over $1 million
Companies are taking the new General Data Protection Regulation (GDPR) much more seriously than HIPAA and PCI: 99 percent are actively involved in the process to become …

RSA Conference 2018 AdvancedU expands security education to new audiences
RSA Conference is known among CTOs, CISOs and information security professionals as the place where the world talks security. What started as a small cryptography conference …

Absolute debuts GDPR data risk assessment
Absolute announced new GDPR Data Risk and Endpoint Readiness Assessments to accelerate compliance with the impending General Data Protection Regulation (GDPR). These …

Illumio and Qualys integrate to deliver vulnerability-based micro-segmentation
Illumio announced new global vulnerability mapping capabilities on its Adaptive Security Platform. Vulnerability and threat data from the Qualys Cloud Platform is integrated …

AMD users running Windows 10 get their Spectre fix
AMD has released new microcode updates for mitigating variant 2 of the Spectre attack and Microsoft has released an OS update with the mitigation to AMD users running Windows …

2.5 billion crypto mining attempts detected in enterprise networks
The volume of cryptomining transactions has been steadily growing since Coinhive came out with its browser-based cryptomining service in September 2017. Some websites have …

Key obstacles in enterprise security budgeting
IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of …