Security News

Hacker-powered security is reaching critical mass
2018-07-12 12:00

HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 million in bounties...

How to speed up cyberattack recovery with Critical Event Management
2018-07-11 13:13

A unified response to cyberattacks and other emergencies can limit damage and greatly improve the recovery process. The Critical Event Management method is one approach to handling these incidents.

Microsoft Fixes 17 Critical Bugs in July Patch Tuesday Release
2018-07-10 19:50

Microsoft patches 17 critical bugs and 34 important bugs as part of its monthly security bulletin.

Why Cybersecurity Is Critical to Healthcare Innovation
2018-07-09 19:48

Groups Offer Feedback on HHS's Plans for Workgroup Focused on Spurring InvestmentsAs the Department of Health and Human Services explores how to spur innovation and investment in the healthcare...

Google Patches Critical Remote Code Execution Bugs in Android OS
2018-07-06 18:54

The July Android Security bulletin tackles 44 vulnerabilities in all, with the bulk rated high in severity.

Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear
2018-07-05 18:05

Broadband gear made by Advanced Digital Broadcast is being patched to fix three vulnerabilities rated critical.

Google Fixes Critical Android Vulnerabilities
2018-07-05 14:23

Google this week released its July 2018 set of Android patches to address tens of vulnerabilities in the mobile operating system, including several rated as Critical. read more

Austerity Bites Critical National Infrastructure Security
2018-07-03 20:33

LogRhythm's Ross Brewer Talks GDPR, Cybercrime and Critical DefensesMuch more must be done to shore up the U.K.'s national infrastructure. "It's partly austerity, and it's partly what's happening...

Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems
2018-07-03 06:58

In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.

91% of critical incidents involve known, legitimate binaries like PowerShell
2018-06-28 11:45

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint incidents detected in...