Ethical connected car hacking service launched
A new security service developed to test the exposure of connected vehicles to cyber-attacks and help all market players develop security solutions has been launched by …
New fileless malware found in the wild
“Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait over: Phasebot malware, …

Use of encryption continues to rise
The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …

Fox-IT launches cyberthreat management platform
Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …
Valve tries to curb Steam scam accounts with new rule
Gaming corporation Valve is trying to make spammers’ and phishers’ lives more difficult and, consequently, their own users’ gaming experience more pleasant …

Security guidance for early IoT adopters
The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …

Real-time traffic analysis and inventory of virtualized assets
Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …
Russian APT group actively exploiting Flash, Windows 0-day flaws
APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …

Organizations continue to rely on outdated technologies
TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …
Advanced threat detection platform leveraging distributed computing
At the RSA Conference 2015, Damballa unveiled Damballa Failsafe 6.0. This advanced threat detection platform leverages a distributed computing architecture that enables the …

Radware launches hybrid cloud based WAF service
Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …

BlackVault CYNR: Code and document signing appliance
Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground