• August 12, 2015 12 Aug'15

    Darkhotel APT found using Hacking Team Flash zero-day in exploits

    The Darkhotel advanced persistent threat group used an Adobe Flash zero-day vulnerability from the Hacking Team data leak, according to Kaspersky research.

  • August 11, 2015 11 Aug'15

    Microsoft Office bug highlights August 2015 Patch Tuesday

    Microsoft's August 2015 Patch Tuesday may not be as packed with danger as a typical release, according to one expert, but does include critical bulletins for Microsoft Office and even one for the new Edge browser.

  • August 07, 2015 07 Aug'15

    ICANN breached, members' encrypted passwords stolen

    News roundup: ICANN confirmed its members' credentials were stolen Wednesday, forcing the nonprofit to enforce a site-wide password reset. Plus: VPN provider being used for APTs; Thunderstrike strikes again; Windows 10 security in its first week.

  • August 07, 2015 07 Aug'15

    Black Hat 2015: Machine learning security must add variety

    Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.

  • August 07, 2015 07 Aug'15

    Black Hat 2015: Rebuilding IT security after a cyber disaster

    In the wake of a major cyberattack, the process of rebuilding IT security can be daunting, but Christina Kubecka has some tips from her experiences with Saudi Aramco after a massive attack in 2012.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • August 07, 2015 07 Aug'15

    Emerging security trends enterprises should keep an eye on

    Video: KPMG's Ronald Plesco discusses the main emerging security trends -- security analytics, the Internet of Things and virtualization -- and what else is on the horizon for the industry.

  • August 06, 2015 06 Aug'15

    Black Hat 2015 opens with bleak view of Internet freedom

    Legal expert Jennifer Granick kicked off Black Hat 2015 with a warning to conference goers that Internet freedom and openness are dying.

  • August 05, 2015 05 Aug'15

    Security machine learning methods needed to adapt to evolving threats

    Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.

  • August 05, 2015 05 Aug'15

    New report sheds light on the growing threat of bulletproof hosting services

    Cybercrime has developed substantially due to bulletproof hosting service efficiency. Trend Micro's report explains how and why these services evade law enforcement officials and remain online.

  • August 04, 2015 04 Aug'15

    Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important ...

  • August 03, 2015 03 Aug'15

    Cybersecurity skills shortage demands new workforce strategies

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles.

  • July 31, 2015 31 Jul'15

    Protests lead to drafting new Wassenaar Arrangement cybersecurity rules

    Major IT companies, such as Black Hat and Google, spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software. And those protests caused the U.S. Department of Commerce to commit to drafting new rules.

  • July 31, 2015 31 Jul'15

    Tor anonymity called into question as alternative browser surfaces

    News roundup: New threats add to the Tor anonymity debate, as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook is bad -- or is it? Also, another Xen host escape flaw and Wassenaar revisions put on hold.

  • July 31, 2015 31 Jul'15

    Darkode criminal forum reborn less than two weeks after DOJ shutdown

    The recently shutdown Darkode cybercriminal community has been rebuilt, and claims the administrators are intact and security will be tightened to better avoid law enforcement.

  • July 30, 2015 30 Jul'15

    Intel, Cisco pushing for enhanced security communication, integration

    Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?