To Consistently and Significantly Reduce Time to Detection, Security Teams Must Combine Sophisticated Threat Defenses with Skilled Security Researchers
To Consistently and Significantly Reduce Time to Detection, Security Teams Must Combine Sophisticated Threat Defenses with Skilled Security Researchers
SentinelOne lead OS X security expert Pedro Vilaça discovered a serious local privilege escalation vulnerability in OS X that can be leveraged to bypass Apple’s recently introduced System Integrity Protection (SIP) feature.
A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.
Researchers at ESET have discovered a sophisticated data-stealing USB Trojan that leaves no trace on the compromised system and includes a self-protection mechanism that makes it difficult to detect, copy and analyze.
US authorities Tuesday unveiled criminal charges against three members of the so-called "Syrian Electronic Army," which gained notoriety for hacking into news media outlets and making bogus social media posts.
Should you panic about the recently disclosed DROWN SSL vulnerability? Is it cute and kid-friendly, or is it a monster vulnerability coming to expose your most sensitive data?
The DROWN announcement was done the right way:
Microsoft and Samba developers are working on patching a severe vulnerability that is said to affect almost every version of Windows and Samba.
Samba is an open-source interoperability software suite that provides file and print services to SMB/CIFS clients. In addition to Windows, Samba also runs on UNIX, Linux, IBM System 390, OpenVMS and other operating systems.
The US government's decision to delay its effort to force Apple to help unlock an attacker's iPhone may only postpone the inevitable drawn-out battle over encryption and data protection.