Security News

The Persistent Threat of Nation-State Cyberattacks
2019-02-01 12:18

The latest edition of the ISMG Security Report features an update on what U.S. intelligence chiefs told Congress this week about persistent nation-state cyberthreats, plus reports on evasion...

TheMoon Rises Again, With a Botnet-as-a-Service Threat
2019-01-31 21:59

A new module allows it to be rented to other malicious actors -- and it's likely other new capabilities are coming down the pike.

OWASP: What Are the Top 10 Threats and Why Does It Matter?
2019-01-30 12:00

Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.

The biggest cybersecurity challenge? Communicating threats internally
2019-01-30 06:30

IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role, according to Trend Micro. IT teams are under...

Symantec introduces EDR tools and fully-managed service to stop cyber threats
2019-01-30 05:00

Symantec released a new Managed Endpoint Detection and Response (MEDR) service and enhanced EDR 4.0 technology. These advancements improve attack discovery and incident response using AI-driven...

Dragos updates its asset identification, threat detection, and response platform
2019-01-30 04:00

Dragos released version 1.4 of its Dragos Platform, industrial cybersecurity software that codifies threat analytics to provide operational technology (OT) and information technology (IT)...

ENISA outlines top cyber threats and trends in 2018
2019-01-28 10:19

In 2018, the cyber threat landscape changed significantly. The most important threat agent groups, namely cyber-criminals and state-sponsored actors have further advanced their motives and...

Threat Stack announces new API for streamlined DevOps and security workflows
2019-01-25 03:15

Threat Stack released a new API that will give customers the ability to create, deploy, augment, and tune security rules directly within their existing DevOps and security tools. Threat Stack...