CDM Featured Whitepapers

Defending Against Data Breach

Linoma

Are Your Information Security Investments Performing?

Redscan

Knowns & Unknowns

IKANOW


News

Apple fixed Zero-Day flaws exploited by nation-state spyware

Apple issued emergency iOS updates to patch three Zero-Days exploited by a government spyware…

Cybersecurity Ventures 2016 Cybercrime Report – Hackerpocalypse: A Cybercrime Revelation

Hackerpocalypse: A Cybercrime Revelation FROM THE EDITORS AT CYBERSECURITY VENTURES 2016 Cybercrime Report Steve…

vBulletin vulnerabilities exposed more than 27 million users’ records

Security vulnerabilities in the vBulletin platform have exposed more than 27 million accounts, many…

Linux.Rex.1, a new Linux Trojan the creates a P2P Botnet

Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading…

3D models based on Facebook images can fool facial recognition systems

A group of researchers demonstrated that a number of existing facial recognition systems can…

The US DoE has awarded $34 million in funding to secure the power grid

The US Department of Energy (DOE) has awarded $34 million in funding to projects…

Emails among dumps published by Wikileaks includes 300+ malware

A malware researcher has analyzed the attachments of in the WikiLeaks email dumps and…

Snowden: NSA Equation Group hack may be a Russian warning

According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group…

Oracle MICROS hackers breached five more PoS system vendors

Hackers that breached Oracle MICROS systems have infected systems of other five PoS vendors…

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents…

Show Buttons
Hide Buttons