December 9, 2022
Via: Net SecurityHackNotice unveils new platform features, a new logo and wordmark, dark mode, personalized dashboards, risk meters, easier-to-understand alerts, more powerful monitoring, continuous phishing with the press of a button, and new, easy-to-create templates for phishing. The new platform also allows […]
Application security, Security
November 1, 2022
Via: Help Net SecuritySynack launched an API pentesting capability powered by its global community of elite security researchers. Organizations can now rely on the Synack platform for continuous pentesting coverage across “headless” API endpoints that lack a user interface and are increasingly exposed […]
October 3, 2022
Via: CSO OnlineEnd-to-end network security and performance visibility vendor LiveAction has announced new security operations center (SOC) focused updates to its Network Detection and Response (NDR) platform, ThreatEye. In a press release, the firm stated that the platform features a new user […]
December 13, 2019
Via: Security WeekMessaging platform WhatsApp this week announced plans to take legal action against individuals and companies that abuse the platform for bulk messaging. The Facebook-owned platform’s Terms of Service already prohibit automated or bulk messaging, as WhatsApp says it wasn’t designed […]
Application security, Cyber warfare, Cyber-crime, Security
November 11, 2019
Via: Security WeekThe allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. The two Saudis and one US citizen allegedly worked together to unmask […]
September 30, 2019
Via: Dark ReadingA newly disclosed critical vulnerability in the OnApp cloud orchestration platform could let an attacker compromise an entire private cloud with access to a single server, researchers report. The finding comes from researchers at security firm Skylight Cyber who say […]
Access control, Application security, Cyber-crime, Identity theft, Network security, Security
April 24, 2019
Via: Help Net SecurityWorkers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and […]
Application security, Network security, Security
April 22, 2019
Via: CSO OnlineMicrosoft Office has become cybercriminals’ preferred platform when carrying out attacks, and the number of incidents keeps increasing, Kaspersky Lab researchers said during the company’s annual conference, Security Analyst Summit, in Singapore. Boris Larin, Vlad Stolyarov and Alexander Liskin showed […]
November 16, 2018
Via: Help Net SecurityA WEX survey of more than 1,000 CFOs and senior financial executives from the U.S., Europe and Asia/Oceana revealed that for this group, security is paramount in payments solutions or platforms. Security – both of information and settlements – is […]
October 12, 2018
Via: Dark ReadingA wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources. Google this week announced tools and updates related to cloud security and identity access management (IAM), most of which […]
July 20, 2018
Via: Security WeekFlorida-based HR services provider ComplyRight revealed recently that its tax reporting platform was involved in a cybersecurity incident that resulted in the exposure of personal information. ComplyRight learned on May 22 that someone had gained unauthorized access to its web-based […]
May 14, 2018
Via: Security WeekFacebook said Monday it has suspended “around 200” apps on its platform as part of an investigation into misuse of private user data. The investigation was launched after revelations that political consulting firm Cambridge Analytica hijacked data on some 87 […]
March 7, 2018
Via: Security WeekMigrating to the cloud is complex. One of the biggest concerns is a loss of visibility on data in the cloud; and this concern only grows with increasing regulatory requirements. GDPR, coming into force in less than 3 months time, […]
March 6, 2017
Via: Threat PostHackerOne announced on Thursday the availability of a free version of its bug bounty platform called HackerOne Community Edition that will give open source projects tools for managing vulnerability submissions and creating bounty programs to improve software security. Eligible open source projects will […]
January 31, 2017
Via: We Live SecurityRecent phishing scams targeted both Gmail and Yahoo, and now attackers have their sights set on PayPal with some very convincing bait. With fake websites and email campaigns that look real, it’s easy to be fooled, and potentially have your […]
January 4, 2017
Via: InfoWorldOnly a handful of industry associations accomplish what they set out to do. In the security realm, I’ve always been a huge fan of the Trusted Computing Group. It’s one of the few vendor organizations that truly makes computers more […]
December 6, 2016
Via: Dark ReadingHelp us wipe out the remaining bots and put an end to Avalanche once and for all. The last day of November was also the last day of activity for one of the largest cyber-crime platforms in the world. Dubbed […]
September 28, 2016
Via: Russel EdwardsAs some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged […]
September 23, 2016
Via: TrendMicro BlogTrend Micro has seen ransomware on PCs dominate the threat landscape over the last 18 months with their unprecedented volume and destructiveness. But now cybercriminals are attacking another vector: the Android mobile platform. Our research shows unique Android ransomware threats […]
September 19, 2016
Via: Security IntelligenceAlthough the 2016 campaign is unique in many respects, the Donald Trump security platform largely reflects established GOP preferences on specific technology and cybersecurity issues. The platform views government regulation critically while also assigning high priority to national security regulations. […]