Security News

Proofpoint Cloud Account Defense detects compromised Microsoft Office 365 accounts
2018-07-13 15:27

Proofpoint announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss....

The US Department of Defense wants AI to stop future Snowdens
2018-07-11 00:48

Needs the ability to cope with Microsoft docs without breaking The US Department of Defense is exploring how AI might be able to help it automatically label secretive information and control who...

Don't fear 1337 exploits. Sloppy mobile, phishing defenses a much bigger corp IT security threat
2018-07-05 21:24

DARPA-funded white hat emits timeless advice AppSec EU IT admins should focus on the fundamentals of network security, rather than worry about sophisticated state-sponsored zero-day attacks,...

Phishing Defense: Block OAuth Token Attacks
2018-06-21 10:03

But OAuth Attack Defense Remains Tricky, Warns FireEye's Douglas BienstockJust one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a...

China-Linked 'Thrip' Spies Target Satellite, Defense Companies
2018-06-20 04:27

A China-linked cyber espionage group has breached the systems of satellite operators, telecommunications companies and defense contractors in the United States and Southeast Asia, Symantec...

Most aerospace and defense companies to integrate blockchain by 2021
2018-06-15 11:30

Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research report from...

Corporate cyber-defense spending hits a new high
2018-06-12 11:07

A new report reveals that cybersecurity and IT spending has become a top priority for corporate boards, says TechRepublic's Laurel Deppen.

Agari Employs Active Defense to Probe Nigerian Email Scammers
2018-05-23 15:46

Agari, a firm that offers protection against email-borne threats, has spent the last 10 months analyzing the targets, tactics and identities of 10 separate criminal organizations. All ten...

Attackers Use UPnP to Sidestep DDoS Defenses
2018-05-15 16:19

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.