Security News

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them...

MistNet announces the industry’s first multi-entity threat detection and response platform providing 360-degree visibility into threats and vulnerabilities from desktop to data center to public...

Lattice Semiconductor Corporation, the low power programmable leader, announced the MachXO3D FPGA for securing systems against a variety of threats. Unsecured systems can lead to data and design...

Europe’s biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.

All too often, information-sharing is limited to vertical market silos; to build better defenses, it's time to take a broader view beyond the ISAC.

The lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Institute for Critical Infrastructure Technology. In an interview, Rob Roy,...

Deep & dark web (DDW) communities have long been must-have data sources for threat intelligence programs, but only recently has the market caught up with this need. read more

ExtraHop, provider of enterprise cyber analytics from the inside out, launched the ExtraHop for IBM QRadar app, which integrates with IBM Security Intelligence technology to stream accurate,...

Poorly Written Ransomware Still Infects Unpatched SystemsTwo years after WannaCry tore a path of destruction through the world, the ransomware remains a danger, with many systems still vulnerable...

Office 365 Threat Simulation Video Threat actors tend to target Office 365 as one of the primary methods of account compromise.