Windows zero-day flaw and PoC unveiled via Twitter
A Windows zero-day local privilege escalation flaw and a Proof-of-Concept exploit for it have been revealed on Monday by someone who goes by SandboxEscaper on Twitter. The …
Incorporating sensitive asset data into your vulnerability and compliance program
In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating …
IoT failures plague most users worldwide
52% of consumers worldwide are now using Internet of Things (IoT) devices, yet 64% of those have already encountered performance issues – according to Dynatrace. On average, …
Listening-Watch: Strong, low-effort, wearable 2FA scheme
Passwords are still the preferred online authentication method because they are easy to use, but they are increasingly not enough to keep our accounts secure. To mitigate the …
PoC exploit for critical Apache Struts flaw found online
The Apache Software Foundation revealed last week the existence of a critical Apache Struts flaw (CVE-2018-11776) similar to the one exploited in the Equifax breach and urged …
Emerging consensus for an ICS security approach
An increasing body of experience with industrial control system (ICS) security, as well as the emerging Industrial Internet of Things (IIoT) are driving a new consensus as to …
Privacy Shield: Should I stay or should I go?
The lead up to the GDPR enforcement date consumed a large swath of media coverage. This essentially buried the news that in early July 2018, the European Union Parliament …
23% of UK SMBs still use USB drives as their primary data storage solution
Mny British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them …
Blocking compromised passwords: How and why to do it
Passwords are beginning to feel like the zombie that just won’t die. Even after Bill Gates famously called for their demise in 2004, this antiquated form of user verification …
Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing
Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …
Google removes 39 YouTube channels linked to Iranian influence operations
Google has identified and removed 39 YouTube channels, six blogs on Blogger and thirteen Google+ accounts linked to IRIB, the Islamic Republic of Iran Broadcasting, which were …
New infosec products of the week: August 24, 2018
DefenseCode announces free edition of their Web Security Scanner DefenseCode Web Security Scanner is a DAST (Dynamic Application Security Testing) product for testing security …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways