![CSA book](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110837/csa-book-400x200.jpg)
Speakers announced for CSA Summit at RSA Conference 2020
The Cloud Security Alliance (CSA) announced its headlining speakers for the 11th annual CSA Summit at RSA Conference 2020 (Feb. 24, San Francisco). Phil Venables, Board …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094946/ghidra-logo-400x200.jpg)
NSA unveils Ghidra reverse engineering tool at RSA Conference 2019
The National Security Agency (NSA) has released Ghidra, a free and cross-platform software reverse engineering tool suite used internally by the intelligence agency. They are …
![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
Three things to know about the dark web
One of the more curious aspects about the dark web is that it didn’t start out as such a dark place: it began with bulletin boards in the 80s and 90s – the markets of …
![United States Cyber Command](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103337/us_cyber_command-400x200.jpg)
US Cyber Command gets unified military command status
Last week, US President Donald Trump announced that the United States Cyber Command, which is currently a division of the NSA, will be elevated to the status of a Unified …
![WannaCry](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104340/WannaCry-400x200.jpg)
WannaCry: Who’s behind it? Who’s to blame?
As the amount of money in the three bitcoin addresses associated with the WannaCry attack slowly continues to rise, the question of who is behind the ransomware is still …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105953/microsoft-400x200.jpg)
Microsoft to governments: Stop hoarding vulnerabilities
Microsoft is full of surprises lately: first they issued patches for unsupported versions of Windows, then they publicly criticized the NSA for hoarding knowledge about …
![Kaspersky Lab](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104416/kaspersky_lab-fire-400x200.jpg)
US intelligence chiefs don’t trust Kaspersky Lab software
The big question in Thursday’s intelligence hearing on worldwide threats before the US Senate Intelligence Committee was whether the Russian government interfered with …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104734/windows-400x200.jpg)
Script for remote DoublePulsar backdoor removal available
NSA’s DoublePulsar backdoor can now be remotely uninstalled from any infected Windows machine, thanks to the updated detection script provided by security firm Countercept. …
![NSA](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194610/nsa-400x200.jpg)
Tens of thousands Windows systems implanted with NSA’s DoublePulsar
Has your Windows machine been implanted with NSA’s DoublePulsar backdoor? If you haven’t implemented the security updates released by Microsoft in March, chances …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104527/oracle-400x200.jpg)
Oracle fixes Solaris 10 flaw targeted by leaked NSA exploit
Oracle has pushed out a record-breaking 299 fixes for vulnerabilities in its many, many products, and among them is a Solaris 10 bug whose existence has been revealed through …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112354/chain-400x200.jpg)
Shadow Brokers data dump reveals yet another NSA-Stuxnet link
When the Shadow Brokers dumped on Friday another batch of data allegedly stolen from the Equation Group, which has been linked to the NSA, security researchers dove right in. …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105342/patch-400x200.jpg)
Microsoft patched the flaws allowing leaked Windows exploits to work
Microsoft has patched the vulnerabilities that allowed nine of the exploits released by the Shadow Brokers on Friday to work, and said that of the three remaining exploits, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD