300+ Cisco switches affected by critical bug found in Vault 7 data dump
While combing through WikiLeaks’ Vault 7 data dump, Cisco has unearthed a critical vulnerability affecting 300+ of its switches and one gateway that could be exploited …
Cybersecurity today: Turning positive with new thinking and innovation
In this podcast recorded at RSA Conference 2017, Melanie Ensign, Co-Chair for WISP and Head of Security & Privacy Communications at Uber, and Ajay Arora, CEO and founder …
How to harmonize IT GRC controls in your environment
In this podcast recorded at RSA Conference 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about about achieving uniform compliance in risk …
Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …
Unpatched flaw opens Ubiquiti Networks devices to compromise
A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …
Fileless attack framework was used in many recent attacks
In the last month or so, a number of security companies spotted attackers targeting a variety of organizations around the world with spear-phishing emails delivering …
Intel is offering up to $30,000 for bugs in its hardware
Intel has become the latest tech company to launch a bug bounty program. Intel bug bounty program: What’s in scope and what is not Intel is looking for bug hunters to …
New infosec products of the week: March 17, 2017
Capture, process, analyze data generated by IoT devices MapR Technologies announced MapR Edge, a small footprint edition of the MapR Converged Data Platform. Addressing the …
The information security marketplace shift
In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the shift in the marketplace, and how …
Bad bots attack 96% of websites with login pages
Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …
What impact will artificial intelligence have on business?
Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …
User info of millions of Wishbone users slurped by hackers
Science Inc., the company behind the popular online poll creation app Wishbone, has suffered a data breach. As a consequence, personal and account information of over 2.2 …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”