Security News > 2019 > May

We like transparency and we're a CA, hackers hack all night and we log all day
2019-05-15 18:24

Cert authority Sectigo funds Lets Encrypt transparency log Let’s Encrypt has wheeled out a new certificate transparency log called Oak, which is funded for a year by the certificates arm of...

Why MDS vulnerabilities present a threat as serious as Spectre and Meltdown
2019-05-15 18:00

Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.

Tech news roundup: Microsoft Office 365, Facebook scandal, and AI adoption
2019-05-15 17:39

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the...

Hackers Exploit ASUS Update Process to Install Backdoor
2019-05-15 17:21

The BlackTech cyber-espionage group has been performing man-in-the-middle (MitM) attacks on the update process of the ASUS WebStorage application to deliver the Plead backdoor to their targeted...

Be Proactive: Fight and Mitigate Future Attacks with Cyber Threat Hunting
2019-05-15 16:48

To prevent future attacks, organizations must identify and investigate attackers after an incident.To prevent future attacks, organizations must identify and investigate attackers after an incident.

The Ride-Along: Intelligence Analysis for Real Time Crime Centers
2019-05-15 16:48

Learn about technologies and methods to more effectively and efficiently combat crime using intelligence analysis.Learn about technologies and methods to more effectively and efficiently combat...

Intel ZombieLoad Side-Channel Attack: 10 Takeaways
2019-05-15 16:48

Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.

UK Supreme Court Overturns Ultimate Authority of Investigatory Powers Tribunal
2019-05-15 16:41

The UK Supreme Court has delivered a ruling that ensures that intelligence agency surveillance action can be challenged in the courts, and is subject to the rule of law. read more

The Shortcomings of Network Monitoring in Fighting ICS Threats
2019-05-15 16:34

Passive and Active Threat Detection is Needed to Secure Operational Technology (OT) Environments read more

Security Automation Firm Respond Raises $20 Million
2019-05-15 16:26

Respond Software, a California-based company that specializes in helping security teams become more efficient through automation technology, on Tuesday announced that it raised $20 million in a...