Security News

Phishing Defense: Block OAuth Token Attacks
2018-06-21 10:03

But OAuth Attack Defense Remains Tricky, Warns FireEye's Douglas BienstockJust one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a...

China-Linked 'Thrip' Spies Target Satellite, Defense Companies
2018-06-20 04:27

A China-linked cyber espionage group has breached the systems of satellite operators, telecommunications companies and defense contractors in the United States and Southeast Asia, Symantec...

Most aerospace and defense companies to integrate blockchain by 2021
2018-06-15 11:30

Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research report from...

Corporate cyber-defense spending hits a new high
2018-06-12 11:07

A new report reveals that cybersecurity and IT spending has become a top priority for corporate boards, says TechRepublic's Laurel Deppen.

Agari Employs Active Defense to Probe Nigerian Email Scammers
2018-05-23 15:46

Agari, a firm that offers protection against email-borne threats, has spent the last 10 months analyzing the targets, tactics and identities of 10 separate criminal organizations. All ten...

Attackers Use UPnP to Sidestep DDoS Defenses
2018-05-15 16:19

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.

Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed
2018-05-11 21:18

Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop hackers from mounting attacks.

Why collaboration can be a killer app for defense
2018-05-08 12:15

In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why collaboration is...

Understanding the Role of Multi-Stage Detection in a Layered Defense
2018-05-08 08:12

It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.