Secures data in dormant virtual machines
PKWARE announced vZip, a software application that secures and reduces sensitive data within dormant virtual machines. With vZip, organizations eliminate costs related to …
Automate security policy management for business applications
AlgoSec announced BusinessFlow, a new product that automates security policy management for business applications and provides the link between application connectivity …
Georgia shows photos of Russian-based hacker spy
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Bank of America customers under phishing attack
Bank of America customers, beware – the old “account suspended” warning purportedly sent by your bank’s Cardmember Services is hitting inboxes once …
Gang steals over $1M by exploiting Citigroup e-payment flaw
Fourteen individuals were charged following a FBI-led investigation into the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern …
Application Security updates its database scanning tool
Application Security announced the latest release of its database scanning tool, AppDetectivePro. Expanded capabilities and a new user interface provide security, risk and IT …
Secunia Vulnerability Intelligence Manager 4.0 released
The Secunia VIM 4.0 covers more than 40,000 software systems and applications. Its provides intelligence about software vulnerabilities available to organizations, ensuring …
Microsoft’s worldwide threat assessment
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …
EMC to acquire Silver Tail Systems
EMC has signed a definitive agreement to acquire Silver Tail Systems, a provider of real-time web session intelligence and behavioral analysis. Terms of the deal were not …
Interactive CERT map from ENISA
ENISA has published a new interactive CERT map and Inventory of CERT’s activities in Europe containing publicly listed teams and co-operation, support and …
Trojan Horse: A Novel
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)