Security News > 2019

Almost every activity on the Internet starts with a DNS query, a key function of the Internet that works as an Internet's directory where your device looks up for the server IP addresses after you...

Remember "The Shadow Brokers" and the arrest of a former NSA contractor accused of stealing 50 Terabytes of top secret documents from the intelligence agency? It turns out that, Kaspersky Lab,...

Threat intelligence is one of the hottest terms in information security at the moment. But, as with so many buzzwords, it is often overused and misused. All the buzz has created a lot of...

Patches pending for distros to deal with threat of local privilege escalation to root Security biz Qualys has revealed three vulnerabilities in a component of systemd, a system and service manager...

For the majority of UK businesses, a huge amount of time and resource was invested to become GDPR compliant in time for the May 2018 deadline. The cost of implementing GDPR was substantial, with a...

2018 shed a lot of light on how expensive successful phishing attacks can be, with the FBI reporting in July well over $12B in financial losses due to business email compromise and Anthem reaching...

Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage targets manufacturing...

This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of using...

FireEye revealed a number of new defenses that are now available on FireEye Email Security – Server Edition, in direct response to the changing cyber threat landscape. “FireEye continues to keep...

Red Hat launched Red Hat Ansible Tower 3.4, the latest version of its enterprise framework for automating across IT operations including infrastructure, networks, cloud and security. Red Hat...