Please turn on your JavaScript for this page to function normally.
Was your company one of the targets of Operation Shady RAT?

“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know,” …

Coding error reveals RSA attackers operated from China

A simple error message returned by a server to which a malware sample was trying to connect revealed to Dell SecureWorks researchers the origin of the RSA attack, says Joe …

Tracking anomalies from multiple sources across the organization

Zettaset unveiled its new Security Data Warehouse (SDW), which enables users to track up to petabytes of business and security data for anomalies and other potentially …

New Hotmail security features against account hijacking

Microsoft has decided to introduce two new security features for its web-based Hotmail service, in the hope that this will make the accounts more difficult to hijack and …

Attack against Lockheed Martin result of previous RSA breach?

Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …

New HP application security solutions

HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …

Network protection against unknown zero-day malware

ValidEdge announced its new Network Malware Security (NMS) system – a combined hardware and software solution that continuously monitors critical networks for any …

124 new advanced evasion techniques discovered

Stonesoft announced it has discovered 124 new advanced evasion techniques (AETs). Samples of these AETs have been delivered to the Computer Emergency Response Team (CERT-FI), …

A test of 13 intrusion prevention systems

NSS Labs released its network IPS comparative group test report for the fourth quarter of 2010. In the year since NSS Labs’ last IPS test, attackers have refined their …

Fwsnort: Application layer IDS/IPS with iptables

Fwsnort parses the rules files included in the Snort intrusion detection system and builds an equivalent iptables ruleset for as many rules as possible. Fwsnort utilizes the …

NSA considers its networks compromised

Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be …

Snorby: Modern Snort IDS frontend

Snorby is a modern Snort IDS frontend. The basic fundamental concepts behind Snorby are simplicity and power. The project goal is to create a free, open source and highly …

Don't miss

Cybersecurity news