Please turn on your JavaScript for this page to function normally.
abstract, generic
Week in review: Fileless malware, HTTPS interception in the wild, simple Gmail spoofing

Here’s an overview of some of last week’s most interesting news, reviews and articles: Banks around the world hit with fileless malware Kaspersky Lab researchers …

Qualys
Qualys at RSA Conference: Implementing innovation

There will be no lack of interesting content from Qualys at this year’s RSA Conference. Depending on you interests, you might want to make time for some of these talks …

magnify look search
The security impact of HTTPS interception in the wild

HTTPS deployment is on an upward trajectory, and this growth is accompanied by the increasing HTTPS interception and SSL inspection by enterprise-grade firewalls, web filters, …

lights
New infosec products of the week​: February 10, 2017

Capsule8: Container-aware, real-time threat protection for Linux Capsule8 emerged from stealth mode to unveil its plans for the industry’s first container-aware, …

CERT
CERT updates insider threat guidebook

The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. …

Vera for Mail
Vera for Mail protects the confidentiality of email messages and attachments

Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …

phone call
LaunchKey: Passwordless consumer authentication at scale

iovation announced its LaunchKey mobile multifactor authentication solution. It empowers global consumer brands to improve security and consumer experience by delivering a …

gap
UK sports retailer Sports Direct hacked

UK’s largest sports retail outlet Sports Direct has suffered a data breach in September 2016, when an attacker gained access to its staff portal, and through it to …

Gmail
Simple Gmail spoofing leaves users open to targeted attacks

Gmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come from a non-Gmail server. …

DDoS
DDoS attacks increasingly form blended attacks of more vulnerabilities

DDoS attacks increasingly formed blended attacks of four or more vulnerabilities over the course of the fourth quarter of 2016, with an intent to overload targeted monitoring, …

data
Less than half of organizations trust their data for business decisions

Data is being used by businesses in more ways than ever before, but they still lack trust in their data. While data supports major business initiatives, the level of data …

strategy
Security practices need to evolve in order to handle complex threats

There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …

Don't miss

Cybersecurity news