Security News

Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has revealed. "So far, we have found samples that are either pretending to be various hacking tools or pretending to be installers of the Chrome Internet browser," they noted.

A former CIA software engineer accused of stealing a massive trove of the agency's hacking tools and handing it over to WikiLeaks was convicted of only minor charges Monday, after a jury deadlocked on the more serious espionage charges against him. Joshua Schulte, who worked as a coder at the agency's headquarters in Langley, Virginia, was convicted by a jury of contempt of court and making false statements after a four-week trial in Manhattan federal court that offered an unusual window into the CIA's digital sleuthing and the team that designs computer code to spy on foreign adversaries.

A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.

A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. Schulte, who designed hacking tools and malware for both the CIA and NSA to break into adversaries computers, was arrested in August 2017 and initially charged with possession and transportation of child pornography.

First came 'fuzzing', a long-established technique for spotting bugs such as security flaws in real applications using automated tools. More recently, security fuzzing tools have expanded in number, and today there are hundreds of specialised open-source tools and online services designed to probe specific types of software.

The fate of the man accused of leaking top-secret CIA hacking tools - software that gave the American spy agency access to targets' phones and computer across the world - is now in the hands of a jury. Joshua Schulte stands accused of stealing the highly valuable materials directly from the CIA's innermost sanctum and slipping them to WikiLeaks to share with the rest of the planet.

Keysight's 5G Device Benchmarking Toolset speeds performance validation of 5G devices prior to market introduction. The toolset combines Keysight's UXM 5G Wireless Test Platform and Nemo Outdoor with new Nemo 5G Device Analytics software to deliver an integrated lab-based test solution that enables users to benchmark devices, troubleshoot, resolve issues and ultimately enhance product quality.

Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today's digital workplace, a Code42 survey reveals. Collaboration tools rated among top vectors for data exfiltration.

The Open Cybersecurity Alliance today announced the availability of OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common messaging framework. With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language.

Providing managed security service providers with the world's best threat intelligence products, these additions offer extended benefits and accelerated growth opportunities to new and existing participants of the company's MSSP Partner Program. ScoutPRIME. A global attack surface management platform to help identify and manage potential security vulnerabilities associated with subsidiaries, partners, suppliers, and others outside of organizations' perimeter, it can be integrated with existing SIEM and big data solutions for a broader view and understanding of the potential impact of threats.