It’s time to replace firewalls in industrial network environments
Waterfall Security Solutions announced the expansion of its stronger-than-firewall solution portfolio for industrial control systems and critical infrastructure sites. …
Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems
Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …
Photo gallery: Black Hat USA 2016 Business Hall, part 2
A few more photos from the Black Hat USA 2016 Business Hall. Featured companies: NSFOCUS, Qualys, FireEye, Synack, Forcepoint, LogRhythm. Also featured is the US Department of …
New home router OS tackles firmware shortcomings
Untangle announced the release of a new operating system for consumer Wi-Fi routers at DEF CON 24. Router hardware has evolved and improved over the years, but its firmware …
75% of the top 20 US banks are infected with malware
SecurityScorecard released its 2016 Financial Cybersecurity Report, a comprehensive analysis that exposes cybersecurity vulnerabilities across 7,111 global financial …
Zeus Panda variant targets Brazilians, wants to steal everything
A new Zeus Trojan variant dubbed Panda Banker has been specially crafted to target users of 10 major Brazilian banks, but also other locally popular services. “Zeus …
Fake iPhone order dispatch confirmations hitting inboxes
Fake dispatch confirmation emails for a bogus order of an iPhone from Apple’s App Store are hitting inboxes, warns Hoax-Slayer. This is just the latest variant of the …
Can a computer system compete against human CTF experts?
DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …
Apple finally announces bug bounty program
Apple is finally going to monetarily reward security researchers for spotting and responsibly disclosing bugs in the company’s products. The announcement that a bug …
58% of orgs have no controls in place to prevent insider threats
More than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization …
Kazakhstan govt targeted journalists, political activists with spyware
Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …
Dagah: Penetration testing for enterprise mobility programs
Shevirah Inc. will unveil at Black Hat USA 2016 the free version of dagah – a product that empowers security test teams to assess the security posture of their mobility …
Featured news
Resources
Don't miss
- What types of compliance should your password manager support?
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email