Black Hat
CrowdStrike launches Intelligence Exchange Program
At Black Hat, CrowdStrike announced the launch of the CrowdStrike Intelligence Exchange Program (CSIX). The exchange enables vendor partners to access and share threat …
The weak links in an increasingly dynamic threat landscape
The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations – outdated software, bad code, abandoned …
New game sharpens secure coding skills
Today at Black Hat, Checkmarx launched Game of Hacks, a challenging game for software developers and security professionals to test their application hacking skills, improve …
Malicious USB device firmware the next big infection vector?
Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …
CSA ups the ante on virtual hackathon
The Cloud Security Alliance (CSA) today announced that it has upped the ante, as no one has yet been able to hack the Software Defined Perimeter (SDP) network since the …
USB “condom” protects from mobile device juice jacking
A group of Georgia Tech researchers has created quite a stir at this year’s Black Hat conference when they showcased chargers capable of installing malware on iPhones, …
Defending against the BREACH attack
When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …
Experienced employees more important than a rising security budget
Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …
Researchers create DIY IDS for identifying hacked smartphones
A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …
Decoy water plant attracts hackers, Chinese APT1 crew
A Trend Micro researcher that has lately concentrated on finding out just how often industrial control systems are attacked and from where has shared the latest findings of …
Engineers demonstrate PLC hack on mock oil rig
The widely known Stuxnet incident made sure that the mere mention of SCADA vulnerabilities is enough for security experts to pause. After all, sabotaging industrial control …
Techniques malware authors use to evade detection
FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments