Rapid7 Insight platform is the first cloud-based platform to combine vulnerability management, user behaviour analytics-powered SIEM, IT log analytics, and…
Browsing: Strategy and Planning
Last week, Radware highlighted a new form of malware called BrickerBot that corrupts a device’s storage capability and reconfiguring kernel parameters. Cesare…
The significant threat cyber attacks represent to commerce and infrastructure is intensifying calls for government to “encourage” companies and agencies…
Following the news that Wonga, the payday lender has experienced a data breach that may affect up to ‘245,000 UK…
Sathurbot: Distributed WordPress password attack This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its…
The recent terrorist attack in Westminster has brought with it renewed questions about the use of end-to-end encryption by messaging…
Collaboration to assess performance overhead of virtualization technologies in embedded devices SANTA CLARA, CALIF. Today the prpl Foundation and EEMBC announced a formal partnership to…
5G technology is the next step in the development of mobile communication. 5G will not only provide voice and data…
An Israeli cybersecurity researcher has uncovered 40 unknown zero-day vulnerabilities in Samsung’s operating system Tizen. The vulnerabilities “would allow someone to remotely…
The “Big Data” movement has made its way into every facet of business, especially the security organization. There is an…