Security News

Windows 10 Exploit Guard Boosts Endpoint Defenses
2017-11-01 17:24

Courtesy of the Windows Defender Exploit Guard that ships with Windows 10 Fall Creators Update, systems running Microsoft’s Windows 10 operating system can fend off emerging threats, Microsoft...

Chris Eng: An infosec journey from offense to defense
2017-10-30 16:00

“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for an obscure Linux bug, and Eng was...

Moving Target Defense Startup Cryptonite Emerges From Stealth
2017-10-26 13:16

Cryptonite, a Rockville, Maryland-based startup that aims to prevent reconnaissance and lateral movement in the network using moving target defense and micro-segmentation technologies, has emerged...

Proactive Defense Against Phishing
2017-10-23 15:33

When it comes to warding off phishing attacks, too many organizations are reliant on internal awareness campaigns. But a more proactive defense and controls are needed, says John "Lex" Robinson of PhishMe.

Defense contractors, manufacturers targeted with malware-as-a-service infostealer
2017-10-10 16:56

Information stealing FormBook malware is being lobbed at defense contractors, manufacturers and firms in the aerospace sector in the US and South Korea. Delivery methods The malware is delivered...

FormBook Malware Targets US Defense Contractors, Aerospace and Manufacturing Sectors
2017-10-09 15:00

FormBook info-stealing malware has been part of two recent distribution campaigns and is being sold on the Dark Web for as little as $29 a week.

New Rowhammer Attack Bypasses Existing Defenses
2017-10-06 11:46

A group of security researchers has discovered a new type of attack that can exploit the Rowhammer vulnerability in DRAM chips that was uncovered several years ago, effectively bypassing existing...

DHS Seeks to Be More Active in Agencies' Cyber Defense
2017-10-03 19:33

Top Cybersecurity Official Tells Lawmakers Election Security Is His No. 1 PriorityA top Department of Homeland Security cybersecurity official says DHS is seeking to play a more active role in...

The Three Pillars of Hypothesis-Driven Threat Defense
2017-09-27 12:09

 There are two possible outcomes: if the result confirms the hypothesis, then you've made a measurement. If the result is contrary to the hypothesis, then you've made a discovery. read more

DMARC in Higher Education: A Formidable Defense Against Targeted Scams
2017-09-12 12:20

DMARC Can Be Effective in Defending Against Targeted Phishing Attacks And Student Loan Scams read more