Security News

Tracking Cybersecurity Threats in Manufacturing
2018-08-13 20:18

With the rise of the industrial internet of things comes a far broader attack surface in the manufacturing sector. Chris Morales of Vectra outlines findings of a new report on cyberattack trends...

Dragos to integrate ICS-specific threat intelligence with cyber intelligence partners
2018-08-10 20:35

Dragos announced that its industrial control system (ICS) threat intelligence product, WorldView, will integrate with partner companies, ThreatConnect, Recorded Future, ThreatQuotient, and...

SentinelOne partners with SecBI to provide threat visibility, containment and remediation
2018-08-10 20:07

SentinelOne announced that the company has partnered with SecBI. By combining SentinelOne’s threat visibility, containment and remediation capabilities with SecBI’s Autonomous Investigation...

Proofpoint launches TAP Isolation, threat detection, and Threat Response python scripting
2018-08-09 21:22

Proofpoint announced three people-centric security innovations, including Targeted Attack Protection (TAP) Isolation for personal webmail and browsing defense, threat detection, and new Threat...

Smart cities are exposed to old-school threats
2018-08-09 18:10

Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart city devices and...

Campaigns on Their Own as Cyber Threats Roil Midterms
2018-08-06 15:34

NEW YORK (AP) — Kamala Harris has been the target of social media misinformation campaigns since she became a U.S. senator. read more

Bay Dynamics and CyberSponse empower organizations to prioritize critical threats
2018-08-05 15:08

Bay Dynamics announced a new technology partnership with CyberSponse. Under this partnership, Bay Dynamics has integrated its Risk Fabric cyber risk and UEBA platform with the CyberSponse Cyber...

Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
2018-08-02 15:40

Pre-execution security technologies coupled with core antimalware technologies can effectively detect and not just block the cryptojacking payload, but also prevent the attack from occurring.

The Disconnect Between Understanding Email Threats and Preventing Them
2018-08-01 15:57

Email continues to be the starting point for the majority of all security breaches. The 2018 Verizon Data Breaches Investigation Report (DBIR) says that email is the attack vector in 96% of...

ThreatConnect expands its threat intelligence analysis workbench
2018-08-01 12:57

To continue to help organizations streamline threat intelligence, operations, and incident response, ThreatConnect announces improved functionality and features to ease security operations process...