Security News


New EU Report Sidesteps Concerns About Huawei's RoleNation-state attackers from outside the European Union pose the greatest threat to the continent's upcoming 5G networks, according to a new...

Haben sie nicht von dem Streisand-Effekt gehört? Malware authors behind the Finfisher spyware suite, well beloved by dictators, have sent legal threats intended to silence a German news blog that...

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

FireEye announced the availability of FireEye Digital Threat Monitoring – a new way for customers to defend their digital footprint across otherwise inaccessible facets of the web. Traditional...

In 2010, SANS reported that knowledge of the Pass the Hash attack first described some thirteen years earlier was still poor. By 2019, knowledge of the threat vector that has now been in the...

When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking a significant gap. Nathan Hunstad of Code42 discusses how to plug this...

Michael Theis of CERT Insider Threat Center on Best PracticesThe battle against insider threats requires a balance of sanctions and incentives, says Michael Theis of the CERT Insider Threat Center.

Kevin Haley of Symantec Shares Key FindingsKevin Haley of Symantec shares key findings from the company's latest Internet Security Threat Report.

This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...