News

Schneier says: Technology—our biggest asset. And headache.

It’s happening all around us. Computers are taking roles we never thought they could. They’re our weathermen….

What is Genetic Malware Analysis?

By Roy Halevi At Intezer, we view malware analysis as a key component in properly and effectively…

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained…

Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year

By Zach Malone, security engineer, FireMon During this time of year, we see endless articles projecting predictions…

Application Isolation and Control – A Modern Defense for New Threats

By Fraser Kyne, EMEA CTO, Bromium  The detection method for preventing malware is fundamentally flawed, yet it…

Can Endpoint Isolation Finally Thwart Cyber attackers?

Standard security strategies aren’t working so enterprises are turning to isolation-based prevention by Tal Zamir, Co-Founder &…

New Trickbot module implements Remote App Credential-Grabbing features

The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new…

December Patch Tuesday

Updates for Windows, Office,Net Framework, Adobe, Firefox and More by Chris Goettl, Manager of Product Management, Security,…

A new batch of 127 million records appears in the dark web

A new batch of 127 million records appears in the dark web, this time the huge trove…

Could Censys serve as a threat intelligence collector?

By Milica D. Djekic The fact is so many visible web search engines could offer you a…

Show Buttons
Hide Buttons