Security News
A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.
A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.
First came 'fuzzing', a long-established technique for spotting bugs such as security flaws in real applications using automated tools. More recently, security fuzzing tools have expanded in number, and today there are hundreds of specialised open-source tools and online services designed to probe specific types of software.
The fate of the man accused of leaking top-secret CIA hacking tools - software that gave the American spy agency access to targets' phones and computer across the world - is now in the hands of a jury. Joshua Schulte stands accused of stealing the highly valuable materials directly from the CIA's innermost sanctum and slipping them to WikiLeaks to share with the rest of the planet.
Keysight's 5G Device Benchmarking Toolset speeds performance validation of 5G devices prior to market introduction. The toolset combines Keysight's UXM 5G Wireless Test Platform and Nemo Outdoor with new Nemo 5G Device Analytics software to deliver an integrated lab-based test solution that enables users to benchmark devices, troubleshoot, resolve issues and ultimately enhance product quality.
Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today's digital workplace, a Code42 survey reveals. Collaboration tools rated among top vectors for data exfiltration.
The Open Cybersecurity Alliance today announced the availability of OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common messaging framework. With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language.
Providing managed security service providers with the world's best threat intelligence products, these additions offer extended benefits and accelerated growth opportunities to new and existing participants of the company's MSSP Partner Program. ScoutPRIME. A global attack surface management platform to help identify and manage potential security vulnerabilities associated with subsidiaries, partners, suppliers, and others outside of organizations' perimeter, it can be integrated with existing SIEM and big data solutions for a broader view and understanding of the potential impact of threats.
Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not working as expected, according to Keysight. "Enterprises are faced with a continuous stream of cyberattacks that threaten their businesses, and in many cases they attempt to deal with these by buying more security tools. Yet they don't know whether these products are delivering the protection they expect," said Scott Register, vice president, security solutions at Keysight's Network Applications & Security Group.
Finding what cloud services employees are using is half the battle-integrating Microsoft Cloud App Security and Defender Advanced Threat Protection lets you track, block, or audit cloud app usage. Microsoft Cloud App Security now includes a shadow IT discovery tool that integrates with Defender ATP to discover cloud app and service usage on any managed device.