Security News > 2018 > May

SecBI announced an agreement with Orange Polska in the field of network security. The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running several use cases —...

Florida-based phone maker BLU is facing an FTC complaint over allegations it shared detailed personal user data with a third-party firm that included full text messages, call logs and contact lists.

Threatpost talks to Christie Terrill of Bishop Fox about the pros and cons of using bug bounty programs versus penetration testing for companies.


How might blockchain improve digital identity proofing in the healthcare sector? The National Health Information Sharing and Analysis Center and security vendor Trusted Key are testing that out...

Ruby CISO Matthew Maglieri on How to Bounce Back From a High-Profile BreachThe Ashley Madison breach of 2015 quickly became one the most famous of the high-profile hacks. Three years later, CISO...

A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account. About the vulnerability The...

Bad actors are leveraging the critical Drupal vulnerability to install cryptomining malware on servers and browsers,

2017 was a landmark year for ransomware, with WannaCry and NotPetya grabbing headlines around the world. Ransomware attacks grew by more than 400% over the year, while the number unique families...

Artificial Intelligence, Bug Squashing, Secure DevOps and MoreWhat matters most, right now, to the information security community? At RSA 2018, RSA's president said WannaCry was a wakeup call for...