[*] [-] [-] [x] [A+] [a-]  
[l] at 1/22/21 3:40pm
News likely contributed to slide of over 9% in chipmaker's stock at one point Friday.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/22/21 2:30pm
The fastest-moving industries are struggling to produce secure code, according to AppSec experts.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/22/21 2:00pm
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/22/21 8:00am
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 4:40pm
Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 3:35pm
Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 2:55pm
Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 11:00am
Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 10:20am
Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 9:25am
The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's how to see through its tricks.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/21/21 8:00am
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/20/21 5:45pm
Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/20/21 3:00pm
During Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/20/21 8:00am
The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 4:05pm
Seven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 3:25pm
Enforcement mode for the Netlogon Domain Controller will be enabled by default with the Feb. 9 security update.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 3:05pm
Meanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot signs of the attack.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 1:30pm
Here's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor. (Sponsored)

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 11:00am
Building security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are largely unknown.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/19/21 8:00am
Best practices for a shifting visibility landscape.

[Link to media]

[*] [-] [-] [x] [A+] [a-]  
[l] at 1/15/21 1:55pm
Joyce has long worked in US cybersecurity leadership, most recently serving as the NSA's top representative in the UK.

[Link to media]

As of 1/23/21 3:38pm. Last new 1/22/21 4:22pm.

Next feed in category: Tech News World