Latest Posts

Fa42af438e58b799189dd26386f5870f

1 Million South Korean Credit Card Records Found Online

August 08, 2019 Added by:Ionut Arghire

Over 1 million South Korea-issued Card Present records have been posted for sale on the dark web since the end of May.

Comments  (0)

019f0bfa701317d0e838d7bb01218770

Top Three Cross-Site Scripting Attacks You Need to Know Now

July 31, 2019 Added by:Johnny Rice

Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Arkose Labs Launches Private Bug Bounty Program

July 29, 2019 Added by:Ionut Arghire

Fraud prevention technology provider Arkose Labs announced the launch of a private bug bounty program on crowdsourced security platform Bugcrowd.

Comments  (0)

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

9fa920b7e1a16185ac7565a871901719

Best Practices for Remote Workers’ Endpoint Security

July 22, 2019 Added by:Mathivanan Venkatachalam

One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Cisco Patches Critical Flaw in Vision Dynamic Signage Director

July 20, 2019 Added by:Ionut Arghire

Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cybersecurity: Drones Will Soon Become Both Predator and Prey

July 19, 2019 Added by:Steve Durbin

Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.

Comments  (0)

2de88989281faa7581932957d89e74d2

The Automotive Industry: Stepping up on Defense

July 19, 2019 Added by:David Barzilai

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

Comments  (0)

7b6799b0baa4ae08467bb98e99a89ae4

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

July 19, 2019 Added by:Filip Truta

Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.

Comments  (0)