News

  • Scammers Sent Uber to Take Elderly Lady to the Bank

    PRIVACY PRIVACY Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the bank and wired money to the fraudsters.  In this case, the woman figured out she was being scammed before embarking for the bank, but…

    Read More

  • Microsoft bolsters threat intelligence security portfolio with two new products

    PRIVACY PRIVACY Drawing from last year’s acquisition of RiskIQ, Microsoft is adding two new threat-intelligence applications to its Defender product family, and separately offering new detection and response capabilities for SAP ERP systems to its Sentinel SIEM (security information and event management) product. Combining intelligence from the security research team at RiskIQ with existing in-house…

    Read More

  • Microsoft boosts threat intelligence with new Defender programs

    PRIVACY PRIVACY Drawing from last year’s acquisition of RiskIQ, Microsoft is adding two new threat-intelligence applications to its Defender product family, and separately offering new detection and response capabilities for SAP ERP systems to its Sentinel SIEM (security information and event management) product. Combining intelligence from the security research team at RiskIQ with existing in-house…

    Read More

  • Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

    PRIVACY PRIVACY Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021 International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains. Background On August 4, the Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint…

    Read More

  • CREST and OWASP Partner on Verification Standard Program

    PRIVACY PRIVACY The standard is designed to provide buyers of application security assessment services with high levels of assurance Read More

    Read More

  • Gaming Sector Cyber-Attacks Up 167% in Last 12 Months

    PRIVACY PRIVACY The US was the main target of attackers, followed by Switzerland, India, Japan and the UK Read More

    Read More

  • Deep Instinct’s Prevention for Applications detects malicious files in transit

    PRIVACY PRIVACY Cybersecurity vendor Deep Instinct has announced the launch of Deep Instinct Prevention for Applications, a new antimalware software product that detects and stops malicious files in transit. Prevention for Applications is deployed via a container within a customer’s environment and does not require cloud access, with device and system agnostic flexibility that allows…

    Read More

  • A Blueprint for Ransomware Defense Using the CIS Controls

    PRIVACY PRIVACY Whether big or small, you can’t afford to take a passive approach to ransomware. You need to shift to active ransomware defense. Read More

    Read More

  • SIKE Broken

    PRIVACY PRIVACY SIKE is one of the new algorithms that NIST recently added to the post-quantum cryptography competition. It was just broken, really badly. We present an efficient key recovery attack on the Supersingular Isogeny Diffie­-Hellman protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the existence of a small non-scalar…

    Read More

  • Smashing Security podcast #286: Hackers doxxed, Pornhub probs, and Co-op security measures

    PRIVACY PRIVACY Pornhub has a problem, the UK’s Co-op supermarket is accused of big brother tactics, and we take a look at how a security researcher is revealing the true identify of hackers. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham…

    Read More

News, Advisories and much more

Exit mobile version