Advertisement
Top

Tag: Platform


Cyber-crime, Phishing

HackNotice 4.0 allows companies to craft custom phishing templates

December 9, 2022

Via: Net Security

HackNotice unveils new platform features, a new logo and wordmark, dark mode, personalized dashboards, risk meters, easier-to-understand alerts, more powerful monitoring, continuous phishing with the press of a button, and new, easy-to-create templates for phishing. The new platform also allows […]


Application security, Security

Synack’s API pentesting capability empowers users to verify exploitable API vulnerabilities

November 1, 2022

Via: Help Net Security

Synack launched an API pentesting capability powered by its global community of elite security researchers. Organizations can now rely on the Synack platform for continuous pentesting coverage across “headless” API endpoints that lack a user interface and are increasingly exposed […]


Network security, Security

LiveAction adds new SOC-focused features to ThreatEye NDR platform

October 3, 2022

Via: CSO Online

End-to-end network security and performance visibility vendor LiveAction has announced new security operations center (SOC) focused updates to its Network Detection and Response (NDR) platform, ThreatEye. In a press release, the firm stated that the platform features a new user […]


Mobile security

WhatsApp Will Take Legal Action Against Automated or Bulk Messaging

December 13, 2019

Via: Security Week

Messaging platform WhatsApp this week announced plans to take legal action against individuals and companies that abuse the platform for bulk messaging. The Facebook-owned platform’s Terms of Service already prohibit automated or bulk messaging, as WhatsApp says it wasn’t designed […]


Application security, Cyber warfare, Cyber-crime, Security

Twitter Spy Case Highlights Risks for Big Tech Platforms

November 11, 2019

Via: Security Week

The allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. The two Saudis and one US citizen allegedly worked together to unmask […]


Cloud security, Security

Cloud Vulnerability Could Let One Server Compromise Thousands

September 30, 2019

Via: Dark Reading

A newly disclosed critical vulnerability in the OnApp cloud orchestration platform could let an attacker compromise an entire private cloud with access to a single server, researchers report. The finding comes from researchers at security firm Skylight Cyber who say […]


Access control, Application security, Cyber-crime, Identity theft, Network security, Security

A casual approach to workplace communications presents major security risks

April 24, 2019

Via: Help Net Security

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and […]


Application security, Network security, Security

Microsoft Office now the most targeted platform, as browser security improves

April 22, 2019

Via: CSO Online

Microsoft Office has become cybercriminals’ preferred platform when carrying out attacks, and the number of incidents keeps increasing, Kaspersky Lab researchers said during the company’s annual conference, Security Analyst Summit, in Singapore. Boris Larin, Vlad Stolyarov and Alexander Liskin showed […]


Network security

What senior finance executives think about payments security

November 16, 2018

Via: Help Net Security

A WEX survey of more than 1,000 CFOs and senior financial executives from the U.S., Europe and Asia/Oceana revealed that for this group, security is paramount in payments solutions or platforms. Security – both of information and settlements – is […]


Cloud security

Google Adds New Identity, Security Tools to Cloud Platform

October 12, 2018

Via: Dark Reading

A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources. Google this week announced tools and updates related to cloud security and identity access management (IAM), most of which […]


Hacker, Network security

HR Services Firm ComplyRight Suffers Data Breach

July 20, 2018

Via: Security Week

Florida-based HR services provider ComplyRight revealed recently that its tax reporting platform was involved in a cybersecurity incident that resulted in the exposure of personal information. ComplyRight learned on May 22 that someone had gained unauthorized access to its web-based […]


Network security

Facebook Suspends 200 Apps Over Data Misuse

May 14, 2018

Via: Security Week

Facebook said Monday it has suspended “around 200” apps on its platform as part of an investigation into misuse of private user data. The investigation was launched after revelations that political consulting firm Cambridge Analytica hijacked data on some 87 […]


Cloud security

McAfee Launches Security Platform for Azure Cloud

March 7, 2018

Via: Security Week

Migrating to the cloud is complex. One of the biggest concerns is a loss of visibility on data in the cloud; and this concern only grows with increasing regulatory requirements. GDPR, coming into force in less than 3 months time, […]


Vulnerabilities

HackerOne Offers Open Source Projects Free Access to Platform

March 6, 2017

Via: Threat Post

HackerOne announced on Thursday the availability of a free version of its bug bounty platform called HackerOne Community Edition that will give open source projects tools for managing vulnerability submissions and creating bounty programs to improve software security. Eligible open source projects will […]


Phishing

PayPal users targeted in sophisticated new phishing campaign

January 31, 2017

Via: We Live Security

Recent phishing scams targeted both Gmail and Yahoo, and now attackers have their sights set on PayPal with some very convincing bait. With fake websites and email campaigns that look real, it’s easy to be fooled, and potentially have your […]


Access control

Better authentication: Go get ’em, FIDO

January 4, 2017

Via: InfoWorld

Only a handful of industry associations accomplish what they set out to do. In the security realm, I’ve always been a huge fan of the Trusted Computing Group. It’s one of the few vendor organizations that truly makes computers more […]


Cyber warfare

Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up

December 6, 2016

Via: Dark Reading

Help us wipe out the remaining bots and put an end to Avalanche once and for all. The last day of November was also the last day of activity for one of the largest cyber-crime platforms in the world. Dubbed […]


Editorial, Privacy protection

Beveiligingscontrole – trying to elucidate a word

September 28, 2016

Via: Russel Edwards

As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged […]


Malware, Mobile security

Mobile Ransomware: The Fast Growing Yet Unknown Threat

September 23, 2016

Via: TrendMicro Blog

Trend Micro has seen ransomware on PCs dominate the threat landscape over the last 18 months with their unprecedented volume and destructiveness. But now cybercriminals are attacking another vector: the Android mobile platform. Our research shows unique Android ransomware threats […]


Access control

The Trump Security Platform: Maintaining the GOP Status Quo

September 19, 2016

Via: Security Intelligence

Although the 2016 campaign is unique in many respects, the Donald Trump security platform largely reflects established GOP preferences on specific technology and cybersecurity issues. The platform views government regulation critically while also assigning high priority to national security regulations. […]