Date | Title | Description |
05.03.2025 | Knostic Secures $11 Million to Fortify AI Security in Enterprises | In the digital age, data is the new gold. But with great wealth comes great risk. Enter Knostic, a rising star in the realm of enterprise artificial intelligence security. The company recently announced an impressive $11 million funding rou... |
05.03.2025 | Knostic raises $11M to strengthen enterprise AI security with need-to-know access controls
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our m... | Enterprise artificial intelligence security startup Knostic Inc. announced today that it has raised $11 million in new funding to bolster its offering, support enterprises with their AI transformation, and add a customizable safety layer to... |
05.03.2025 | Knostic Nabs $11 Million to Eliminate Enterprise AI Data Leaks | Knostic, the world’s first provider of need-to-know access controls for Generative AI, today celebrates an $11 million investment to secure enterprise large language models (LLMs). The funding will be used to bolster Knostic’s offering, sup... |
12.01.2025 | Navigating the Digital Security Landscape: Why VoIP and Virtual Firewalls Matter | In the ever-evolving world of technology, security is paramount. Businesses today are like ships sailing through a stormy sea. The waves of cyber threats crash against them, and without proper defenses, they risk sinking. Two critical tools... |
10.01.2025 | Worried About VoIP Security and Encryption? We Aren’t | Any modern business using a Voice over Internet Protocol (VoIP) phone system knows that maintaining security is essential for confidentiality, customer trust, and regulation compliance.
Industries like healthcare, for example, have strict r... |
21.11.2024 | The Inactivity Reboot: A New Layer of Security in iOS 18 | In the digital age, security is paramount. With every update, tech giants like Apple strive to bolster defenses against threats. The latest addition to iOS 18, the Inactivity Reboot feature, exemplifies this commitment. This function aims t... |
20.11.2024 | Реверс-инжиниринг новой функции iOS Inactivity Reboot | В iOS 18 появилась новая функция безопасности: перезагрузка бездействия (inactivity reboot). От чего она защищает и как работает? В этом посте мы рассмотрим все подробности вплоть до расширения ядра и Secure Enclave Processor.
Безопасность ... |
07.10.2024 | Ретрансляция Kerberos. Как работает RemoteKrbRelay | Введение
Доброе утро, добрый день, вечер и добрая ночь, Хабр! Меня зовут Миша, впрочем в детстве я звал себя «Мо». В свободное от сна, еды и спорта время я работаю ведущим экспертом по тестированию на проникновение в команде CICADA8 Центра ... |
17.09.2024 | The Double-Edged Sword of Domain Registration: Security Risks and New Opportunities | In the digital age, domain registration is akin to claiming a piece of land in a vast, uncharted territory. It’s a gateway to the online world, a crucial step for businesses and individuals alike. But as recent events have shown, this seemi... |
11.09.2024 | Rogue WHOIS server gives researcher superpowers no one should ever have | Enlarge
Aurich Lawson | Getty Images reader comments 19
It’s not every day that a security researcher acquires the ability to generate counterfeit HTTPS certificates, track email activity, and execute code of his choice on thousands of serv... |
20.08.2024 | Why it's worth returning to Black Hat | I may not care for Las Vegas in the heat of August, yet I would come back as everything I need to learn and everyone I need to see face to face is at Black Hat.
Concentrated in one week, I meet customers, learn from their feedback, understa... |
15.08.2024 | Black Hat USA 2024 Closes on Record-Breaking Event in Las Vegas | Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2024. The event welcomed more than 21,700 unique at... |
09.08.2024 | Атаки «на понижение версии» отменяют исправления обновлённых систем Windows 10 и 11 | Исследователь безопасности SafeBreach Алон Левиев на Black Hat 2024 сообщил, что две уязвимости нулевого дня могут использоваться в атаках «на понижение версии» и для отмены исправлений полностью обновлённых систем Windows 10, 11 и Server. ... |
08.08.2024 | Rapid7 report reveals surge in ransomware attacks & new groups | Rapid7 researchers have reported over 2,570 ransomware attacks in the first half of 2024, with 21 new ransomware groups identified. The findings are part of the Rapid7 Ransomware Radar Report, released in conjunction with the company's pres... |
07.08.2024 | Black Hat and DEF CON Roundup 2024: What to Expect From This Week’s Security Events | Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8;... |
05.08.2024 | HP Wolf: Not just software attacks; hackers are coming for enterprise hardware, too | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Today’s enterprises are software-focused and software-driven, meaning that much of the emphasis of cybersecurity ... |
01.08.2024 | Stamus Networks Releases Latest Edition of Stamus Security Platform | Cyber Defenders Now Have Access to Powerful New Network-Based Attack Surface Visibility, Threat Detection, and Reporting Capabilities
INDIANAPOLIS and PARIS, Aug. 1, 2024 /PRNewswire/ -- Stamus Networks, a global provider of high-performanc... |
30.07.2024 | Horizon3.ai Launches NodeZero™ Cloud Pentesting to Transform Cloud Security | Advanced Solution Identifies Complex Vulnerabilities Across AWS and Azure Environments, Ensuring Comprehensive Cloud Security for Organizations of All Sizes
SAN FRANCISCO–(BUSINESS WIRE)–July 30, 2024–
Horizon3.ai, a leading provider of aut... |
29.07.2024 | Appdome boosts fraud detection with new geo-compliance features | Appdome announced it has improved its Geo-Fraud Detection service with the addition of Geo-Location Fencing and Geo DeSync Attack Detection.
These enhancements aim to help mobile app developers and enterprises eliminate location-based fraud... |
15.07.2024 | Endor Labs Receives Strategic Investment From Citi Ventures | PALO ALTO, Calif.–(BUSINESS WIRE)–July 15, 2024–
Endor Labs, a leader in software supply chain security, announced a strategic investment from Citi Ventures. In a further validation of Endor Labs’ unique approach to securing the software su... |
05.07.2024 | HAProxy Technologies named leader 18 times in the G2 Summer 2024 | HAProxy Technologies has achieved a significant milestone by being named a leader in 18 categories in the G2 Summer 2024 Grid Reports. This achievement not only acknowledges their longstanding dominance in Load Balancing and Container Netwo... |
25.06.2024 | Computer Scientists Find New Security Loophole That Allows Spying on Internet Users | By Jace Dela Cruz
Published Jun 25, 2024 11:38AM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Computer scientists at Graz University of Technology have uncovered a new security ... |
17.05.2024 | Десериализация VIEWSTATE: команда Solar 4RAYS изучила кибератаку азиатской группировки с «недозакрытой уязвимостью» | В 2023 году мы запустили блог центра исследования киберугроз Solar 4RAYS, где делимся аналитикой об актуальных угрозах, результатами расследований инцидентов, полезными инструментами для реагирования на кибератаки и другими практическими ма... |
17.04.2024 | OffSec Names Applied Technology Academy Exclusive Black Hat USA Training Partner | OffSec Names Applied Technology Academ
Applied Technology Academy elevates on-site cyber training by teaching 3 highly sought-after OffSec courses: PEN-200 (OSCP), SOC-200 (OSDA) and EXP-401 (OSEE)
DEERFIELD BEACH, FLORIDA, USA, April 17, 2... |
16.04.2024 | OffSec Names Applied Technology Academy Exclusive Black Hat USA Training Partner | Applied Technology Academy elevates on-site cybersecurity training by teaching three highly sought-after OffSec courses: PEN-200 (OSCP), SOC-200 (OSDA) and EXP-401 (OSEE)
NEW YORK, April 16, 2024 /PRNewswire/ -- OffSec, the leader in contin... |
12.04.2024 | Кибератаки уровня «космос»: зачем хакеры взламывают спутники и к чему это приводит | Есть ли в космосе место для хакеров? Увы, где человек что-то сотворил, найдутся и те, кто захочет созданное разрушить или обратить себе на пользу. Единственного в истории подозреваемого в хакерстве на орбите — астронавта Энн Маклейн — суд о... |
28.03.2024 | Fueling Cybersecurity Innovation: Vivek Ramachandran Takes on Black Hat Arsenal Review Board Role with a Mission to Mentor and Motivate the Next Generation | SINGAPORE, March 28, 2024 /PRNewswire/ -- In the field of cybersecurity, very few events command the respect that BlackHat does. Known for its Briefings, Trainings and Arsenal, the conference series has become a cornerstone for the security... |
23.03.2024 | Знакомство с TPM (доверенным вычислительным модулем) | TPM (Trusted Platform Module) — это международный стандарт, обеспечивающий доверенную работу с вычислительными платформами в целом и предоставляющий ряд возможностей обеспечения безопасности в компьютерных системах, в частности: хеширование... |
07.03.2024 | Black Hat USA 2024 announces inaugural AI Summit | Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced that The AI Summit at Black Hat USA will debut as a core component of the event’s 2024 programming. This year, Black Hat USA 2024 w... |
15.02.2024 | 2024 Microsoft Conference Calendar: For Partners, IT Pros and Developers | In-Depth 2024 Microsoft Conference Calendar: For Partners, IT Pros and Developers
Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss. By Gladys RamaFebruary 15, 2024
D... |
13.12.2023 | How worried should we be about the “AutoSpill” credential leak in Android password managers? | Enlarge / Close up of hand holding smartphone and screen applications with unlocking mobile phones. Concept of technological safety.
Getty Images reader comments 53
By now, you’ve probably heard about a vulnerability named AutoSpill, which ... |
05.12.2023 | How Arnica’s CEO foresees generative AI’s impact on DevOps security | Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here.
VentureBeat recently sat down (virtually) with Nir Valtman, CEO and co-founder of Arnica. Valt... |
02.12.2023 | Атака LogoFAIL на код прошивок UEFI доставляет буткиты при загрузке картинок в разделе ESP (EFI System Partition) | Исследователи из Binarly раскрыли тип атаки под общим названием LogoFAIL на код прошивок UEFI от различных поставщиков ПК и ноутбуков. Механизм атаки использует множественные ошибки в безопасности, которые позволяют устанавливать буткиты че... |
08.11.2023 | Три хопа над уровнем неба | Всем привет. Меня зовут Валерий Кузьменков, я аналитик информационной безопасности. О том, чем занимаются аналитики ИБ в Positive Technologies, мы уже рассказывали в этом посте. Я же из тех аналитиков, которые работают с консалтинговыми про... |
11.09.2023 | Time-based атаки во вредоносном ПО и противодействие им | Киберпреступники постоянно совершенствуют методы атак, используя среди прочего знания о принципах работы систем защиты. Например, появилось целое направление техник sandbox evasion" data-abbr="обхода песочниц">обхода песоч... |
08.09.2023 | The Emergence Of P4CHAINS: A Case Study In Securing Business Applications | JP oversees the research and innovation teams that keep Onapsis on the cutting-edge of the business-critical application security market. |
15.08.2023 | Security professionals see a passwordless future drawing closer | We are moving nearer to a passwordless future according to a survey from Delinea carried out at at the 2023 Black Hat USA Conference.
A survey of 100 attendees finds 54 percent say that 'passwordless' is a viable concept while 79 percent ag... |
13.08.2023 | Исследование: многие новые спутники связи от разных стартапов не имеют систем защиты и передают данные без шифрования... | Представленное на конференции по безопасности Black Hat исследование показало, что многие спутники связи на низкой околоземной орбите не имеют систем защиты и передают данные без шифрования. Это обстоятельство значительно упрощает их удалён... |
12.08.2023 | How the FBI goes after DDoS cyberattackers | In 2016, hackers using a network of compromised internet-connected devices — vulnerable security cameras and routers — knocked some of the then biggest websites on the internet offline for several hours. Twitter, Reddit, GitHub and Spotify ... |
09.08.2023 | Next-gen OSDP was supposed to make it harder to break in to secure facilities. It failed. | Enlarge
Getty Images reader comments 100 with
Researchers have discovered a suite of vulnerabilities that largely break a next-generation protocol that was designed to prevent the hacking of access control systems used at secure facilities ... |
09.08.2023 | White House launches AI Cyber Challenge to test how top AI models protect software | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
At the Black Hat USA conference in Las Vegas today — the nation’s largest hacking conference — the Biden-Harris administration announced the launch of... |
08.08.2023 | Dropzone AI launches autonomous AI agent to investigate security alerts, raises $3.5M in seed funding | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
Dropzone AI, a startup that aims to automate the tedious and time-consuming work of investigating security alerts, announced today that it has raised ... |
08.08.2023 | wolfSSL Featuring New Post Quantum Cryptography and country specific cipher support at Black Hat 2023 | EDMONDS, Wash. (PRWEB) August 08, 2023
wolfSSL INC. (Headquarters: Edmonds, Washington, USA), a vendor specialized in cryptography and network security, is excited to share updates regarding their products and technology at Black Hat 2023 t... |
08.08.2023 | ThreatX Extends API Protection With Sensitive Data Detection and Visualizations | Boston, MA – August 8th, 2023 – ThreatX, the leading API and application protection platform, today announced new sensitive data exposure capabilities for APIs. Unveiled at Black Hat 2023, these capabilities help security teams detect and v... |
07.08.2023 | Fasoo Announces Fasoo EDRM for Source Code Security to Protect Source Codes Throughout Development Lifecycle | Fasoo - a leader in data-centric security
This enhanced capability allows customers to protect their source code persistently from external cyberattacks and insider threats during its lifecycle.
BETHESDA, MD, USA, August 7, 2023/EINPresswir... |
06.08.2023 | Эксперты сообщили о возможности получения доступа к закрытым опциям центрального компьютера электромобилей Tesla... | Эксперты по ИБ и инженеры из Берлинского технического университета (Technische Universitat Berlin), а также независимый исследователь, сообщили о возможности получения доступа к закрытым опциям центрального компьютера электромобилей Tesla н... |
03.08.2023 | Hackers Claim 'Tesla Jailbreak' Unpatchable, Can Unlock $15,000 Software-Locked Features | Joseph Henry, Tech Times 03 August 2023, 02:08 pm
Tesla's Full Self-Driving package and free heated seats are being hidden behind a paywall, but there's an exploit to instantly unlock them.
According to the latest report, a group of hackers... |
02.08.2023 | Onapsis to Present Critical ERP Vulnerability Research During Black Hat USA 2023 | BOSTON—August 2—Onapsis, the market leader in business application security and compliance, today announced that members of the Onapsis Research Labs (ORL) will be leading a briefing at Black Hat USA 2023, documenting the team’s ongoing res... |
13.07.2023 | Top Tech Conferences & Events to Add to Your Calendar in 2023 | Image: Anton Gvozdikov/Adobe Stock
Conferences and expos are alive and well in 2023. Many tech events are back to being in person; there is also a mix of hybrid and virtual-only events, so there are plenty of options.
Here is a comprehensiv... |
03.07.2023 | Security Week 2327: RowPress, новая атака на оперативную память | На прошлой неделе исследователи из Швейцарской высшей технической школы Цюриха опубликовали работу, в которой показали новый метод атаки на ячейки оперативной памяти. Метод RowPress развивает идеи атаки RowHammer, впервые показанной в 2014 ... |
22.05.2023 | Millions of Android devices are infected with malware before they leave the factory | At Black Hat Asia, a team of Trend Micro security researchers claimed that millions of Android devices are infected with malware before they leave the factories.
One of the most effective ways of infecting Android devices is to do so before... |
19.05.2023 | Potentially millions of Android TVs and phones come with malware preinstalled | Enlarge / Cybercriminals or anonymous hackers use malware on mobile phones to hack personal and business passwords online.
Getty Images reader comments 102 with
Overall, Android devices have earned a decidedly mixed reputation for security.... |
18.05.2023 | Исследователи раскрыли детали атаки PMFault, с помощью которой можно повредить процессоры части серверных систем... | Исследователи из Бирмингемского университета раскрыли детали атаки PMFault, с помощью которой можно безвозвратно повредить процессоры на материнских платах некоторых серверных систем, например, Supermicro с поддержкой IPMI (X11, X12, H11 и ... |
04.05.2023 | Что такое URL | В прошлом году Дэниэл Стенберг, создатель curl, написал пост об одном забавном URL:
http://http://http://@http://http://?http://#http://
Пост интересен, рекомендую его прочитать. Автор объясняет, как устроен URL, и как различные системы его... |
03.05.2023 | I'm a model for Las Vegas trade shows and conventions. The men are annoying and the days are long — but I make a good living and the perks are insane. | Tawny Triska Pollard. Lorraine London
Redeem now
Tawny Triska Pollard works as a trade-show and convention model in Las Vegas. Her days begin at 6 or 7 a.m., and working the convention floor can go as late as 7:30 p.m. There are perks such ... |
20.02.2023 | Black Hat to Launch Official Certification Program | The world’s leading cybersecurity conference Black Hat is to launch its first ever certification program – Black Hat Certified Pentester (BCPen).
Intended for professional penetration testers; bug-bounty hunters; in-house red and blue team ... |
26.01.2023 | eBPF в production-условиях | У технологии eBPF много поклонников. Она предлагает множество плюсов, но в работе с ней есть и некоторые минусы, сложности и ограничения. Давайте разберемся со всем этим.
Данный материал подготовлен на базе выступления “eBPF в production-ус... |
16.12.2022 | Mental health: 66% of cybersecurity analysts experienced burnout this year | Check out all the on-demand sessions from the Intelligent Security Summit here.
Cybersecurity is a high-stakes game. With the average data breach costing $4.35 million, security analysts are under constant pressure to protect critical data ... |
16.12.2022 | 66% of Cybersecurity Experts Burn Out From Pressure to Prevent Data Breaches: Report | Trisha Kae Andrada, Tech Times 16 December 2022, 03:12 pm
Because of the staggering average cost of $4.35 million per data breach, security analysts are under continual pressure to safeguard valuable data assets. Apparently, they are freque... |
09.12.2022 | Технооптимизм. Разбираемся, как киберпреступники могут использовать машинное обучение | Как правило, первое, с чем ассоциируется словосочетание «машинное обучение» (machine learning) — это цифровизация, наращивание темпов производства всего на свете, распознавание речи, умные помощники и прочее. Однако, как и у всех продвинуты... |
15.11.2022 | Эксплойтинг браузера Chrome, часть 1: введение в V8 и внутреннее устройство JavaScript | Cегодня браузеры играют жизненно важную роль в современных организациях, поскольку всё больше программных приложений доставляется пользователям через веб-браузер в виде веб-приложений. Практически всё, что вы делаете в Интернете, включает в... |
01.11.2022 | «Хакер»: Самые важные события в мире инфосека за октябрь | На Xakep.ru ежедневно публикуются самые актуальные новости из мира информационной безопасности, а в конце каждого месяца мы подводим итоги. В качестве эксперимента мы решили предложить этот материал и пользователям «Хабрахабра».
В этом меся... |
26.09.2022 | Дайджест новостей за август 2022 | Всем привет! Сегодня у нас из интересных событий наделавший шуму отчёт об оставляющих желать лучшего ИБ-стандартах Твиттера, незавидная судьба криптомиксера Tornado Cash и его разработчиков, новые методы кражи данных с изолированных от сети... |
16.09.2022 | Человек, маска и аватара. Не рано ли переходить на биометрическую идентификацию | В эпоху всеобщей виртуальности и общения через аватары, а также бурно развивающейся биометрической идентификации и дипфейков становится исключительно важно отличать живого человека от неживой подделки, например, от фотографии. В этом и закл... |
29.08.2022 | Facial recognition -- the good, the bad and the getting older | Your friends may not be willing to tell you that you're looking older, but facial recognition systems have no such reservations.
Face-recognition algorithms might struggle to identify you as the same person after just five years, according ... |
25.08.2022 | The Black Hat Conference At 25: Still Fighting The Good Fight | The annual Black Hat security convention proves there is no respite in a world of never-ending ... [+] security threats – from the known, to the unknown, likely and unlikely sources. Xinhua News Agency via Getty Images |
15.08.2022 | Исследователи ИБ нашли следы кода своего инструмента в коммерческих программах для macOS | Эксперты по информационной безопасности провели исследование и выяснили, что часть коммерческих продуктов в сфере кибербезопасности без разрешения копирует алгоритмы других ИБ-инструментов. Данные результаты специалисты из университета Джон... |
15.08.2022 | Black Hat 2022 reveals why machine identities are the most vulnerable | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Enterprises are struggling to secure machine identities because hybrid cloud configurations are too complex to manage, ... |
15.08.2022 | Black Hat 2022 reveals enterprise security trends | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
The blast radius of cyberattacks on an enterprise is projected to keep growing, extending several layers deep into soft... |
15.08.2022 | SpaceX says researchers are welcome to hack Starlink and can be paid up to $25,000 for finding bugs in the network | Elon Musk's SpaceX said it encourages researchers to hack Starlink in a non-disruptive way.
If researchers submit findings through SpaceX's bug bounty program, they could be paid up to $25,000.
Advertisement
SpaceX says responsible research... |
14.08.2022 | Инженер разобрал и взломал терминал Starlink с помощью кастомного мезонина | Инженер из Бельгии по имени Леннерт Воутерс (Lennert Wouters) показал на конференции Black Hat 2022, как можно взломать и скомпрометировать спутниковый терминал Starlink с помощью кастомного мезонина на базе микроконтроллера RP2040.
Для это... |
12.08.2022 | SpaceX's Starlink was hacked using a $25 homemade device, researcher warns | Lennert Wouters said he was able to hack into Starlink using $25 worth of off-the-shelf material.
The hack was performed as a part of SpaceX's bug bounty program.
Advertisement
Security researcher Lennert Wouters said it cost him only $25 t... |
10.08.2022 | Group of security companies launches open source project to ease data sharing | It’s long been known that security is not a problem that companies, even large corporations, can solve on their own. It takes a community working together to battle the kinds of problems that companies are facing today when it comes to cybe... |
09.08.2022 | SGX, Intel’s supposedly impregnable data fortress, has been breached yet again | Enlarge
Intel reader comments 31 with 27 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Intel’s latest generation of CPUs contains a vulnerability that allows attackers to obtain encryption keys an... |
08.08.2022 | Slim.AI Expands Advisory Board, Adding Voices Representing Both Developers and Security Professionals | We recognize that there are challenges at each level of the software supply chain, and so we’re building a team of advisors that bring top-notch expertise to the table so the use of Slim.AI is seen as an industry best practice.
LAS VEGAS (P... |
04.08.2022 | wolfSSL Featuring new Updates on FIPS and Post Quantum Cryptography at Black Hat 2022 | LAS VEGAS (PRWEB) August 04, 2022
wolfSSL INC. (Headquarters: Edmonds, Washington, USA), a vendor specialized in cryptography and network security, is excited to share updates regarding their products and technology at Black Hat 2022 this A... |
04.08.2022 | FireTail to unveil open source API security solution at BlackHat 2022 | MCLEAN, Va. (PRWEB) August 04, 2022
FireTail™, the industry’s first end-to-end solution for API security, will unveil their open source solution at BlackHat 2022. This offers a fully democratized approach for companies of all sizes to build... |
04.08.2022 | Black Hat USA Research Supply Chain and Cloud Security Risks Are Top of Mind | Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, releases its eighth annual community survey Supply Chain and Cloud Security Risks Are Top of Mind. The report highlights important findin... |
20.07.2022 | Аппаратные закладки в процессорах – мифы и реальность | Вокруг вопроса наличия аппаратных закладок в процессорах циркулирует большое количество слухов и спекуляций. Угроза их присутствия в современных процессорах очень часто является едва ли не основным лейтмотивом в обосновании необходимости ис... |
15.07.2022 | The artificial intelligence tug-of-war in the world of cybersecurity [Q&A] | It's a rare cybersecurity product these days that doesn't claim to have some form of AI capability. But exactly what benefits does AI deliver? And is there a risk of an arms race as threat actors also turn to the technology?
We spoke to Cor... |
06.06.2022 | Cobalt Marks Start of 2022 with New CEO, Continued Momentum for PtaaS Adoption | SAN FRANCISCO (PRWEB) June 06, 2022
Cobalt, the leading Pentest as a Service (PtaaS) company, today announced the milestones it achieved in the first half of 2022, including the addition of new CEO Chris Manton-Jones. Today’s technology inf... |
08.04.2022 | Месяц мобильной безопасности. Июль | Привет, Хабр!
Вновь продолжаем серию дайджестов по мобильной безопасности. Вот и прошел очередной. месяц этого жаркого лета. Посмотрим, что интересного появилось в июле, поделимся полезными ссылками на статьи и материалы.
Исследование Andro... |
04.03.2022 | 2022 tech conferences and events to add to your calendar | Image: kasto80/Getty Images/iStockphoto Must-read CXO coverage
Power BI vs. Tableau
ATS: The best applicant tracking systems
Apple, Microsoft top list of most ethical tech companies
How to hire an IoT Architect (TechRepublic Premium)
2020 w... |
27.12.2021 | Security Week 52: цифровой вандализм в промышленных системах | На прошлой неделе издание DarkReading опубликовало показательный кейс о безопасности промышленных IT-систем. К сожалению, ни в статье издания, ни в оригинальном посте исследователей почти не приводится технических деталей. Тем не менее данн... |
22.12.2021 | Inside Adyen: The Log4j Saga | It has been quite a week for the Java Ecosystem and the Open Source communities: on December 9, 2021, a critical vulnerability was discovered in the popular Java Logging framework Log4j (version 2).
In this blog post I am going to talk abou... |
13.12.2021 | Security Week 50: драма вокруг log4j | На прошлой неделе, 9 декабря, были обнародованы детали уязвимости в Apache log4j, библиотеке для сбора и обработки логов. Уязвимость CVE-2021-44228 приводит к выполнению произвольного кода и эксплуатируется тривиально, о чем свидетельствует... |
13.11.2021 | Security researcher: Flaw in Apple Pay, Samsung Pay and Google Pay makes fraud easy for thieves | Image: iStockphoto/ipopba
The balance between hands-free payments and the security standards required to protect those transactions has tipped too far in the wrong direction, according to a security expert. Must-read security coverage
Best ... |
11.11.2021 | Smartphone payments for public transport can be abused to make unlimited purchases | Security researchers have discovered that it is possible to abuse the express transport convenience feature on smartphones with payments systems activated to make unlimited unauthorised purchases.
Russian security vendor Positive Technologi... |
09.11.2021 | Apiiro Unveils Open Source Software Toolkit to Combat Dependency Confusion Attacks | TEL AVIV and NEW YORK, Nov. 9, 2021 /PRNewswire/ -- Apiiro, the leader in Application Risk Management, today announced the release of the Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency... |
18.10.2021 | 2021 tech events, summits and conferences to add to your calendar | Image: iStock/metamorworks What's hot at TechRepublic
Power BI vs. Tableau: BI tools comparison
How to share your screen in Google Meet for macOS
Get lifetime access to Microsoft Office 2021 for just $50
One of the most beautiful and user f... |
15.10.2021 | Расследование: как мы обнаружили новые следы группировки ChamelGang и помогли авиапромышленной компании пресечь ее атаку... | Если помните, недавно мы рассказывали о том, как специалисты нашего экспертного центра безопасности (PT Expert Security Center, PT ESC) обнаружили новую, ранее неизвестную APT-группировку, получившую название ChamelGang (ее профайл смотрите... |
30.09.2021 | Лже-Microsoft, McAfee и Google: как мы обнаружили APT-группу, маскирующую сетевую инфраструктуру под легитимные сервисы | Источник: unsplash
На киберарене появился новый участник: специалисты PT Expert Security Center обнаружили ранее неизвестную преступную группировку. В России она пока нацелена на организации топливно-энергетического комплекса и авиационной ... |
30.09.2021 | Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros | Office macros are a popular attack vector to compromise a user's environment and deploy additional components. That's because macros can hide within documents, often under several layers of obfuscation. In recent years, there has been an in... |
30.09.2021 | 2021 Microsoft Conference Calendar: For Partners, IT Pros and Developers | In-Depth 2021 Microsoft Conference Calendar: For Partners, IT Pros and Developers
Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss. By Gladys RamaSeptember 30, 2021
... |
27.09.2021 | Security Week 39: утечка паролей через Exchange Autodiscover | На прошлой неделе, 22 августа, Амит Серпер (Amit Serper) из компании Guardicore опубликовал исследование уязвимости в протоколе Microsoft Exchange Autodiscover, которая может привести к утечке логинов и паролей при настройке учетной записи ... |
22.09.2021 | An email ‘autodiscover’ bug is helping to leak thousands of Windows passwords | Shipping companies, power plants, and investment banks don’t often share much in common, but new research shows they are all inadvertently leaking thousands of email passwords of their own employees, thanks in part to a design flaw in a wid... |
15.09.2021 | Rapid7 : Craig Williams of Cisco Talos on Proxyware | In this episode of Security Nation, Jen and Tod chat with Craig Williams, recently of Cisco Talos, about proxyware and integrating security acquisitions the right way. Along the way, they touch on the challenges of being a security communic... |
09.09.2021 | Apiiro Appoints Moshe Zioni as VP of Security Research | TEL AVIV, Israel and NEW YORK, Sept. 9, 2021 /PRNewswire/ -- Apiiro, the industry's first Code Risk Platform™, today announced the appointment of industry veteran Moshe Zioni as the company's new VP of Security Research. In his new role, Zi... |
28.08.2021 | This open-source ML model will help you predict vulnerability exploits | The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
Let the OSS Enterprise newsletter guide your open source journey! Sign up here.
Vulnerability management is notoriously di... |
28.08.2021 | This open-source ML model will help you predict vulnerability exploits | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Let the OSS Enterprise newsletter guide your open... |