Black Hat USA 2019
What’s cybercriminals’ most effective weapon in a ransomware attack?
Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files …
Capsule8 announces multimillion-dollar investment from Intel Capital
Capsule8 announced a multimillion-dollar investment from Intel Capital. The rapidly growing company will apply the funds to drive a range of sales, marketing, product …
Warshipping: Attackers can access corporate networks through the mailroom
Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …
Digital Guardian launches DG Wingman, a new free forensic artifact collection tool for security pros
Digital Guardian announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, …
Kiuwan’s application security testing platform helps teams realize DevSecOps goals
Kiuwan, a provider of application security testing tools, announced the availability of free software vulnerability scan trials for the US market, with live demonstrations at …
BlackBerry Intelligent Security enhances mobile endpoint security in zero trust environments
BlackBerry announced the launch of BlackBerry Intelligent Security, the first cloud-based solution that leverages the power of adaptive security, continuous authentication and …
Cloudentity OIDC Authorization Platform enhances data privacy and PII protection
Cloudentity, a leader in cloud Identity and enforcement for Users, Services and Things, announced the release of its next generation OIDC Authorization Platform that provides …
Qualys bringing new prescription for security to Black Hat and DEF CON 2019
At this year’s Black Hat, Qualys is bringing a new prescription for security — the company is providing its Global IT Asset Discovery and Inventory application to businesses …
Blue Hexagon’s new ability inspects encrypted traffic in real-time
Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden …
Stellar Cyber unveils Starlight 3.3, a data- and AI-based security analytics solution
Security analytics provider Stellar Cyber announced the launch of Starlight 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based …
LogicHub’s new capabilities assist security operations teams with codifying intelligent decision-making
LogicHub, the provider of the industry’s most complete security automation platform, announced new capabilities that assist security operations teams with codifying …
SWAPGS Attack: A new Spectre haunts machines with Intel CPUs
Bitdefender researchers have uncovered yet another viable speculative execution side-channel attack that can be leveraged against Intel CPUs and the computers running on them. …