Black Hat
Armor Anywhere: Managed security for any cloud
As growing businesses increasingly rely on public, private and hybrid cloud platforms in addition to internal infrastructures, at Armor is launching Armor Anywhere to keep …
Nishang: Using PowerShell for penetration testing
Nishang is a framework, and a collection of scripts and payloads which enables PowerShell usage for offensive security, penetration testing and red teaming. The tool is the …
Needle iOS security testing tool to be unveiled at Black Hat Arsenal
In a session at Black Hat USA 2016 on Wednesday, Marco Lancini, Security Consultant at MWR InfoSecurity, will demonstrate publicly for the first time a new iOS security …
Visibility and assessment of vulnerable attack paths
Attivo Networks announced that its ThreatMatrix Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack …
IOActive offers offensive security approach to risk assessment
IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …
Infection Monkey: Test a network from an attacker’s point of view
Infection Monkey, a tool designed to test the resiliency of modern data centers against cyber attacks, was developed as an open source tool by GuardiCore’s research …
Global network shares phishing attack intelligence in real-time
IRONSCALES, a multi-layered phishing mitigation solution that combines human intelligence with machine learning, today announced the launch of Federation, a product that will …
Three topics everyone will be talking about at Black Hat USA 2016
There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding …
Flawed code hooking engines open endpoints to compromise
Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …
Cybersecurity concern continues to rise
A new Black Hat report reveals some critical concerns about the information security industry and emerging cyber risks faced by today’s enterprises. In 2015, Black Hat …
What 17 years as an infosec trainer have taught me
July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …
SideStepper vulnerability can be used to install malicious apps on iOS
Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments