Please turn on your JavaScript for this page to function normally.
tunnel
An introduction to deception technology

This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …

(IN)SECURE Magazine #60
(IN)SECURE Magazine issue 60 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 60 has been released today. Table of contents How …

Adobe Flash
Adobe patches newly exploited Flash zero-day

Adobe has released an out-of-band security update for Flash Player that fixes two vulnerabilities, one of which is a zero-day (CVE-2018-15982) that has been spotted being …

captcha
Researchers create AI that could spell the end for website security captchas

Researchers have created new artificial intelligence that could spell the end for one of the most widely used website security systems. The new algorithm, based on deep …

measure
Measuring privacy operations: Use of technology on the rise

Critical privacy program activities such as creating data inventories, conducting data protection impact assessments (DPIA), and managing data subject access rights requests …

social media
Consumers believe social media sites pose greatest risk to data

A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are …

Circle eye
Post-exploitation scanning tool scavenges for useful information

Philip Pieterse, Principal Consultant for Trustwave’s SpiderLabs, has demonstrated at Black Hat Arsenal Europe 2018 a new tool for penetration testers called Scavenger. …

Google Chrome
Chrome 71 is out, with several security changes

Google has released Chrome 71 for Windows, Mac, Linux and Android. The newest version of the popular browser comes with 43 security fixes and many new features, including …

Critical Kubernetes privilege escalation flaw patched, update ASAP!

A critical privilege escalation vulnerability affecting the popular open source cluster management and container orchestration software Kubernetes has been patched on Monday. …

bulb
Situational awareness: Real-time decision making to improve business operations

Although the term situational awareness usually pertains to the military and first responder space, it also plays a crucial role in the efficiency of public and private …

IoT
Major flaws uncovered in leading IoT protocols

Trend Micro warned organizations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular …

connection
Microservices becoming architectural style of choice for application development

Microservices – a software development technique where an application is created by combining numerous smaller services – have evolved from fad to trend, becoming …

Don't miss

Cybersecurity news