Please turn on your JavaScript for this page to function normally.
bomb
IIS attacks surge from 2,000 to 1.7 million over last quarter

IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …

stats
Global spending on security solutions to reach $133.7 billion in 2022

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …

Intra
Jigsaw releases Intra, an Android app that encrypts DNS queries to thwart online censorship

Alphabet subsidiary and tech incubator Jigsaw, which concentrates on creating solutions for “the toughest geopolitical challenges,” has released Intra, an Android …

open source
Downloads of known vulnerable open source components increase 120%

Sonatype today released its fourth annual State of the Software Supply Chain Report, which reveals the widespread use of vulnerable software components by businesses around …

Tor browser
Tor Browser 8 is out: What’s new?

Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …

Qualys CertView
Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …

Google Chrome
Chrome 69 is out, includes many functional and security changes

Ten years ago Google released the first iteration of its Chrome browser. On Tuesday, the company pushed out version 69. It comes with a number of design and functional …

magnify
Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …

Google Chrome
Chrome users get Site Isolation by default to ward off Spectre attacks

Site Isolation, the optional security feature added to Chrome 63 late last year to serve as protection against Spectre information disclosure attacks, has been enabled by …

Gargoyle
Gargoyle: Innovative solution for preventing insider attacks

A group of researchers from UNSW Sydney, Macquarie University, and Purdue University has released a paper on a new and very promising network-based solution for preventing …

Android
Android devices with pre-installed malware sold in developing markets

New low-end Android smartphone devices being sold to consumers in developing markets, many of whom are coming online for the first time, contain pre-installed malware, …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

Don't miss

Cybersecurity news