Security News > 2019 > May

Cert authority Sectigo funds Lets Encrypt transparency log Let’s Encrypt has wheeled out a new certificate transparency log called Oak, which is funded for a year by the certificates arm of...

Microarchitectural Data Sampling are CPU side-channel vulnerabilities that allow attackers to view in-flight data from CPU-internal buffers. Learn more about MDS attacks in this comprehensive guide.

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the...

The BlackTech cyber-espionage group has been performing man-in-the-middle (MitM) attacks on the update process of the ASUS WebStorage application to deliver the Plead backdoor to their targeted...

To prevent future attacks, organizations must identify and investigate attackers after an incident.To prevent future attacks, organizations must identify and investigate attackers after an incident.

Learn about technologies and methods to more effectively and efficiently combat crime using intelligence analysis.Learn about technologies and methods to more effectively and efficiently combat...

Here are 10 top takeaways from Intel's most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.

The UK Supreme Court has delivered a ruling that ensures that intelligence agency surveillance action can be challenged in the courts, and is subject to the rule of law. read more

Passive and Active Threat Detection is Needed to Secure Operational Technology (OT) Environments read more

Respond Software, a California-based company that specializes in helping security teams become more efficient through automation technology, on Tuesday announced that it raised $20 million in a...