A new project from Cybereason, where the team created a fake company as a honeypot to trick the bots commonly…
Browsing: Malware and Vulnerabilities
The BBC today ran a story covering how cyber-attackers are now turning to tools that automate the process of finding and hijacking…
During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly…
New report provides statistics on web application vulnerabilities, based on client security audits performed with PT Application Inspector in 2017…
Bomgar has announced the findings of its 2018 Privileged Access Threat Report, a global survey that explores the visibility, control, and…
While application breaches jumped 55%, emerging DevSecOps practices grew 15% Sonatype, the leader in open source governance and DevSecOps automation,…
Russian hackers are targeting millions of devices around the world to spy, steal information and build networks for potentially devastating…
The ability to predict—and defend against—malicious activity is something of a holy grail in the realm of security. There are…
How Advanced WAF can bolster app security The boundary between data compliance and breaking the law is becoming increasingly fine.…
Today McAfee releases its annual report examining the current state of cloud adoption, with in-depth analysis exploring how organizations are…