- 10 Notable Security Acquisitions of 2019 (So Far)
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
- Common Hacker Tool Hit with Hackable Vulnerability
A researcher has found a significant exploit in one of the most frequently used text editors.
- Better Cybersecurity Research Requires More Data Sharing
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incid …
- Sensory Overload: Filtering Out Cybersecurity's Noise
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
- Triton Attackers Seen Scanning US Power Grid Networks
The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.
- DNS Firewalls Could Prevent Billions in Losses to Cybercrime
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.
- Cyberattack Hits Aircraft Parts Manufacturer
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.
- Congress Gives 'Hack Back' Legislation Another Try
Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.
- The CISO's Drive to Consolidation
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.
- 7 Truths About BEC Scams
Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.
- Google Adds Two-Factor Authentication For Its Apps on iOS
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
- The Rise of 'Purple Teaming'
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
- Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech
ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.
- BlueKeep RDP Vulnerability a Ticking Time Bomb
One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.
- SQL Injection Attacks Represent Two-Third of All Web App Attacks
When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.
- Apple Pledges Privacy, Beefs Up Security
The company hits back at the data economy – and fellow tech giants Facebook and Google – by announcing its own single sign-on service. A host of other iterative security improvements are on their way …
- DNS Observatory Offers Researchers New Insight into Global DNS Activity
Among its early findings, 60% of the DNS transactions captured were handled by just 1,000 name servers.
- CrowdStrike Prices IPO Above Range at $34
The endpoint security firm raised $612 million ahead of today's public debut.
- New Funding Values KnowBe4 at $1 Billion
The $300 million investment is being led by KKR.
- Tomorrow's Cybersecurity Analyst Is Not Who You Think
Organizations can't just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.