Security News
Rather than eliminating bugs, the idea is to add large numbers of non-exploitable bugs to software as decoys to waste cyber-criminals' time.
KnowBe4 shared its Top 10 Global Phishing Email Subject Lines for Q2 2018. The messages in the report are based on simulated phishing tests users received or real-world emails sent to users who...
Lastline CEO Chris Kruegel on How to Get to the Heart of Defending Critical DataBreach defense is a strategic business issue for most enterprises, but too many cybersecurity solutions rely more on...
Few organizations are prepared to mitigate supply-chain risks, despite a majority of them acknowledging they are a huge cyber threat.
Proofpoint announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss....
Needs the ability to cope with Microsoft docs without breaking The US Department of Defense is exploring how AI might be able to help it automatically label secretive information and control who...
DARPA-funded white hat emits timeless advice AppSec EU IT admins should focus on the fundamentals of network security, rather than worry about sophisticated state-sponsored zero-day attacks,...
Vulnerability could be exploited to run arbitrary code on PCs.
A China-linked cyber espionage group has breached the systems of satellite operators, telecommunications companies and defense contractors in the United States and Southeast Asia, Symantec...