Six simple steps to mitigate the grunt work and keep your organization safe.
Care and Feeding of Your SIEM
Six simple steps to mitigate the grunt work and keep your organization safe.
Australian Cyber Security Conference
Bringing security news to you
Six simple steps to mitigate the grunt work and keep your organization safe.
Six simple steps to mitigate the grunt work and keep your organization safe.
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.
Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?
Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?
Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats.
Network infrastructures at most enterprises regularly generate enormous amounts of network
Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats.
Network infrastructures at most enterprises regularly generate enormous amounts of network
Falcon for Mobile offers detection and response capabilities for mobile platforms.
Falcon for Mobile offers detection and response capabilities for mobile platforms.
Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group.
Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement.
Dubbed Operation
Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group.
Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement.
Dubbed Operation
Despite initial apprehension, security pros immediately began to notice some benefits.
Despite initial apprehension, security pros immediately began to notice some benefits.
Cybersecurity researcher at Google’s Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified.
Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS XNU kernel
Cybersecurity researcher at Google’s Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified.
Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS XNU kernel
CISOs: Stop abdicating responsibility for problems with users – it’s part of your job.
CISOs: Stop abdicating responsibility for problems with users – it’s part of your job.
Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report.
Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report.