Security News

Nehemiah Security announced upgrades to the EQ (Exploit Quantifier) platform. EQ tests the effectiveness of an organization’s endpoint configuration against malware and other attacks by leveraging...

Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key...

Singaporeans boffins offer Spectre-protector as Fortinet ponders Android inoculation Black hats haven't yet found a way to mass-exploit the Spectre vulnerability – but mitigations are already arriving.…

Researchers found a new version of GandCrab - but no evidence that the ransomware is using the same SMB exploit as Wannacry.

Build up your network defences, prep for certs Promo Keeping pace with a fast-changing security landscape is becoming an often baffling challenge for many organisations.…

GandCrab, a ransomware family that has received numerous updates in recent months, is now attempting to infect Windows XP machines using the read more

DARPA-funded white hat emits timeless advice AppSec EU IT admins should focus on the fundamentals of network security, rather than worry about sophisticated state-sponsored zero-day attacks,...

Security researchers at Microsoft have unveiled details of two critical and important zero-day vulnerabilities that had recently been discovered after someone uploaded a malicious PDF file to...

Here is a look at what exploit kits, CVEs and other web-based threats are keeping security professionals working overtime in 2018.

Ancient protocol's key vulnerability is fixable Among the many problems that exist in the venerable Network Time Protocol is its vulnerability to timing attacks: turning servers into...