Security News

Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial
2020-03-09 11:57

A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.

Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial
2020-03-09 11:57

A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.

Google launches FuzzBench service to benchmark fuzzing tools
2020-03-05 11:32

First came 'fuzzing', a long-established technique for spotting bugs such as security flaws in real applications using automated tools. More recently, security fuzzing tools have expanded in number, and today there are hundreds of specialised open-source tools and online services designed to probe specific types of software.

Alleged Vault 7 leaker trial finale: Want to know the CIA's password for its top-secret hacking tools? 123ABCdef
2020-03-05 00:47

The fate of the man accused of leaking top-secret CIA hacking tools - software that gave the American spy agency access to targets' phones and computer across the world - is now in the hands of a jury. Joshua Schulte stands accused of stealing the highly valuable materials directly from the CIA's innermost sanctum and slipping them to WikiLeaks to share with the rest of the planet.

Keysight’s new tools speed performance validation of 5G devices prior to market introduction
2020-03-04 03:30

Keysight's 5G Device Benchmarking Toolset speeds performance validation of 5G devices prior to market introduction. The toolset combines Keysight's UXM 5G Wireless Test Platform and Nemo Outdoor with new Nemo 5G Device Analytics software to deliver an integrated lab-based test solution that enables users to benchmark devices, troubleshoot, resolve issues and ultimately enhance product quality.

Cloud-based collaboration tools are a major driver of data exfiltration
2020-02-25 05:30

Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today's digital workplace, a Code42 survey reveals. Collaboration tools rated among top vectors for data exfiltration.

OpenDXL Ontology: An open source language for connecting cybersecurity tools
2020-02-24 12:42

The Open Cybersecurity Alliance today announced the availability of OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common messaging framework. With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language.

Cyber Guardian Network offers enhanced tools and technologies for MSSPs
2020-02-17 23:30

Providing managed security service providers with the world's best threat intelligence products, these additions offer extended benefits and accelerated growth opportunities to new and existing participants of the company's MSSP Partner Program. ScoutPRIME. A global attack surface management platform to help identify and manage potential security vulnerabilities associated with subsidiaries, partners, suppliers, and others outside of organizations' perimeter, it can be integrated with existing SIEM and big data solutions for a broader view and understanding of the potential impact of threats.

SecOps teams face challenges in understanding how security tools work
2020-02-17 05:30

Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not working as expected, according to Keysight. "Enterprises are faced with a continuous stream of cyberattacks that threaten their businesses, and in many cases they attempt to deal with these by buying more security tools. Yet they don't know whether these products are delivering the protection they expect," said Scott Register, vice president, security solutions at Keysight's Network Applications & Security Group.

Cloud computing security: These two Microsoft tools can help you battle shadow IT
2020-02-12 10:04

Finding what cloud services employees are using is half the battle-integrating Microsoft Cloud App Security and Defender Advanced Threat Protection lets you track, block, or audit cloud app usage. Microsoft Cloud App Security now includes a shadow IT discovery tool that integrates with Defender ATP to discover cloud app and service usage on any managed device.