Please turn on your JavaScript for this page to function normally.
redis
Are attackers harnessing your Redis server?

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many …

JASK
New infosec products of the week​: June 1, 2018

JASK transforms how SOC operators visualize cyber attacks JASK is capturing industry demand with new features centered around enterprise-wide alert linkages and analyst …

people
The emergence and impact of the Data Protection Officer

According to Forrester, 80 percent of companies likely didn’t comply with the General Data Protection Regulation (GDPR) deadline, and of those, 50 percent intentionally …

California Senate
California Senate votes to restore net neutrality rules

The California State Senate voted yesterday in favor of a bill aimed at restoring the net neutrality protections put in place by the Federal Communications Commission in 2015, …

1Password
1Password 7: A new design and added security features

AgileBits has released 1Password 7 for Mac and Windows. The password manager is among the most long-lived and popular offerings of its kind out there. Both the Mac and Windows …

EU whois
Will GDPR be the death of WHOIS?

Two cybersecurity and privacy attorneys recently argued that the General Data Protection Regulation (GDPR) will interfere with the availability of the WHOIS database and will …

Apple Face ID
The future of biometric modalities in consumer electronics

The battle for the future of biometric modalities in consumer electronics is expected to become fiercer with each passing year as face and iris recognition are continuously …

Vulcan Cyber
Vulcan Cyber announces continuous vulnerability remediation platform and $4M seed round

Israeli startup Vulcan Cyber today announced $4 million in seed funding for its mission to eliminate the vulnerability remediation gap that unnecessarily exposes enterprises …

HDD
Attacking hard disk drives using ultrasonic sounds

Another group of researchers has demonstrated that hard disk drives (HDDs) can be interfered with through sound waves, but they’ve also shown that ultrasonic signals …

Android apps
Cryptomining apps are on the rise, malicious apps in app stores decline

RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the …

alert
DHS, FBI warn about malware tied to North Korean threat actor

US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by the North Korean government. The …

Qualys CertView
Make certificate visibility and security a part of your overall security program

In this podcast recorded at RSA Conference 2018, Asif Karel, Director of Product Management at Qualys, illustrates why certificate visibility and security should not just be …

Don't miss

Cybersecurity news