Just before midnight last Sunday evening (June 17, 2018), Elon Musk sent an email to all staff. He was dismayed, he said, to learn about a Tesla employee "making direct code changes to the Tesla Manufacturing Operating System under false usernames and exporting large amounts of highly sensitive Tesla data to unknown third parties."
A security vulnerability read more
A series of cyber-attacks targeting the Middle Eastern region use an encrypted downloader to deliver a Metasploit backdoor, AlienVault reports.
At a recent industry conference I heard some commentary about the “disappearance” of ransomware, but I’m here to assure you that that isn’t the case.
Automating Threat Intelligence Prioritization Allows You to Proactively Deploy Appropriate Intelligence to the Right Tools
Use of Hidden Tunnels to Exfiltrate Data Far More Widespread in Financial Services Than Any Other Industry Sector
Network attacks exploiting a recently patched Drupal vulnerability are attempting to drop Monero mining malware onto vulnerable systems, Trend Micro reports.
Cisco on Wednesday released patches for more than 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software.
Google this week announced that it is adding a small amount of security metadata on top of APKs distributed by Google Play in order to verify their authenticity.
IDC’s recently released five-year (2018-2022) Worldwide and U.S. Comprehensive Security Services Forecast projects that the overall worldwide market will reach $69.6 billion in 2022 and will grow at a CAGR of 9 percent during the period. Of all four segments, managed security services is the largest and fastest growing – capturing 32.2 percent of the market by 2022 at a CAGR of 10.2 percent – outpacing IT consulting, systems integration, and education and training.
Microsoft this week announced the public preview of new Azure tools designed help its customers eliminate easily guessable passwords from their environments.
Israel-born startup Intsights Cyber Intelligence has raised $17 million in a Series C funding round led by Tola Capital. It brings the total capital raised by the firm to $41.3 million ($1.8 million seed funding in 2015; $7.5 million Series A in 2016; and $15 million Series B in 2017).
The Quick Look mechanism on macOS, which allows users to check file contents without actually opening the files, may leak information on cached files, even if they reside on encrypted drives or if the files have been deleted.
Thousands of mobile applications running on iOS and Android have exposed over 113 gigabytes of data from 2,300 unsecured Firebase databases, enterprise mobile security firm Appthority says in a new report.
A Massachusetts man pleaded guilty to his role in an ATM “jackpotting” operation, the United States Department of Justice announced this week.
The author of a newly discovered malware downloader allows interested parties to set up a botshop and build a malware distribution network, Netscout Arbor reveals.
By Controlling Security Technology Portion Size, Organizations Can Better Address Strategic Requirements and Work More Efficiently
We have 20 guests online
You know we do!