Security News

Threat Actor Targets Libyans with Malware via Facebook
2019-07-02 16:54

A threat group has been targeting mobile and desktop users in Libya with malware through Facebook pages, Check Point has discovered. read more

How organizations can better protect themselves against supply chain security threats
2019-07-02 15:01

Running regular anti-malware scans and blocking malicious IP addresses are two strategies. But organizations need to do more to defend themselves against security risks from supply chain partners,...

Threat Actor Poisons OpenPGP Certificates
2019-07-01 15:30

Poisoned certificates are in the OpenPGP SKS keyserver network after an unknown threat actor targeted the OpenPGP certificates of two high-profile community contributors. read more

Threat actors are doing their homework, researchers identify new impersonation techniques
2019-06-27 05:15

There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted file-sharing services,...

Elastic SIEM: Speed, scale, and analytical power drive your security operations and threat hunting
2019-06-26 09:57

Elastic, the company behind Elasticsearch and the Elastic Stack, announced the arrival of Elastic SIEM. The initial launch of Elastic SIEM introduces a new set of data integrations for security...

Starlight 3.1 leverages AI and ML for automated threat hunting
2019-06-26 00:00

Security professionals have long struggled with cyber defense activities like manual threat detection and extreme firewall noise – until now. Security analytics provider Stellar Cyber announced...

Threat Stack expands its host-level support for Windows Server OS
2019-06-25 02:00

Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced it has expanded its host-level support to include Windows Server OS. With full support for...

How past threats and technical developments influence the evolution of malware
2019-06-24 05:45

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution of malware-related threats...

Today’s Top Public Cloud Security Threats …And How to Thwart Them
2019-06-21 16:02

In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.