Microsoft Uses Neural Networks to Improve Fuzzing

A team of Microsoft researchers has been working on improving fuzzing techniques by using deep neural networks, and initial tests have shown promising results. Fuzzing is used to find software...
Continue reading
0 Comments

ThreatQuotient Raises $30 Million in Series C Funding

Threat intelligence platform provider ThreatQuotient announced on Monday that it has raised $30 million in Series C funding, bringing the total amount raised by the company to $54 million to...
Continue reading
0 Comments

Financial Services Has Most Code Vulnerabilities of All Industries: Analysis

Last week, the Securities Industry and Financial Markets Association (SIFMA) ran Quantum Dawn IV to test the resiliency and response of the financial services industry to a major cyber incident....
Continue reading
0 Comments

iPhone X's Face ID Bypassed by a Mask

Face ID, the facial biometric unlocking technology included in Apple’s recently launched iPhone X, can be bypassed using a mask, security researchers have discovered. When revealing the new iPhone X...
Continue reading
0 Comments

VMware Patches Vulnerabilities in vCenter Server

The VMware vCenter Server management software is affected by a couple of moderate severity vulnerabilities that can be exploited for obtaining information and remote denial-of-service (DoS) attacks. The first flaw,...
Continue reading
0 Comments

The Evolution of Intelligence in 2017

Intelligence Trends
2017 in Review: The Year of Business Risk Intelligence As security professionals, we’ve faced no shortage of challenges since the start of 2017 -- from the abundance of large-scale data...
Continue reading
0 Comments

Creating ATM Botnets Not Difficult, Researchers Say

ATMs Are Not Immune to Supply Chain Attacks and Other Digital Threats Internet-connected Automated teller machines (ATMs) can be discovered using dedicated search engines and specific keywords and then ensnared...
Continue reading
0 Comments

Google to Ban Android Apps Misusing Accessibility Service

Following an increase in Android malware and adware that abuse accessibility services, Google has decided to take action against all apps that misuse the feature. Much of the adware and...
Continue reading
0 Comments

Chinese Cyberspies Deliver New Malware via CPL Files

A China-linked cyber espionage group that may have been active since as early as 2010 has developed a new piece of malware that it has used in highly targeted attacks...
Continue reading
0 Comments

Hackers Helped Pentagon Patch Thousands of Flaws

Bug bounty programs and a vulnerability disclosure policy have helped the U.S. Department of Defense patch thousands of security holes in its systems. Nearly one year after it announced its...
Continue reading
0 Comments

Privacy Fears Over Artificial Intelligence as Crimestopper

Police in the US state of Delaware are poised to deploy "smart" cameras in cruisers to help authorities detect a vehicle carrying a fugitive, missing child or straying senior. The...
Continue reading
0 Comments

RSA CTO Ramzan on Taking a Risk-Based Security Approach

RSA CTO Ramzan on Taking a Risk-Based Security Approach Tips on Figuring Out How to Fight the Right Battles) • November 9, 2017     15 Minutes    Security practitioners must...
Continue reading
0 Comments

Who Owns Your PII, You or Credit Reporting Agencies?

Who Owns Your PII, You or Credit Reporting Agencies? Also, Previewing the ISMG Healthcare Security Summit) • November 10, 2017     10 Minutes    A report on the head of...
Continue reading
0 Comments

LIVE Webinar: Financial Institutions in The Bitcoin Age: The Cloud-Driven Digital Transformation Imperative

LIVE Webinar: Financial Institutions in The Bitcoin Age: The Cloud-Driven Digital Transformation Imperative
Cybersecurity , Technology LIVE Webinar: Financial Institutions in The Bitcoin Age: The Cloud-Driven Digital Transformation Imperative Presented by OneLogin     60 minutes     Writer and futurist Sir Arthur...
Continue reading
0 Comments

Federal Judge Dismisses Lawsuit Against Malwarebytes

Federal Judge Dismisses Lawsuit Against Malwarebytes
image
image
image
Anti-Malware , Endpoint Security , Technology Malwarebytes' Right to Flag 'Potentially Unwanted Applications' Upheld( jeremy_kirk ) • November 10, 2017     A federal judge has dismissed a lawsuit brought...
Continue reading
0 Comments

Report: SEC Plans Breach Reporting Guidance Refresh

Report: SEC Plans Breach Reporting Guidance Refresh
Breach Notification , Breach Preparedness , Breach Response Regulator Set to Revise 6-Year-Old Cybersecurity Rules( euroinfosec ) • November 10, 2017    William Hinman, the SEC's new director of corporation...
Continue reading
0 Comments

Malwarebytes Scores Legal Win Over Enigma Software

Enigma Software, supplier of software known as SpyHunter, has a notice on its website: "Malwarebytes Inc., the maker of Malwarebytes Anti-Malware ("MBAM") and AdwCleaner, is intentionally blocking SpyHunter and RegHunter...
Continue reading
0 Comments

Antivirus Quarantine Flaws Allow Privilege Escalation

AVGater
Several popular antivirus products are affected by a type of vulnerability that allows an attacker to escalate privileges on a compromised system by abusing the quarantine feature, a researcher warned...
Continue reading
0 Comments

What Do You Ask Your Cyber Threat Intelligence Analyst?

Questions to ask Threat Analyst
As a former CISO and as head of an analyst team at a threat intelligence vendor, I’ve written a lot about cyber threat intelligence - what it is/should be, the...
Continue reading
0 Comments

We Need More Girl Scouts and Analytics

Women in Cybersecurity
New Strategies Must be Put Into Action to Deal With the Imbalance of Cybersecurity Resources Globally, two-thirds of organizations admit to a lack of cybersecurity expertise . ISACA predicts a...
Continue reading
0 Comments