CYBER DEFENCE SUMMIT UAE
Home Page Banner August 30, 2018

CYBER DEFENCE SUMMIT UAE

Black Hat USA
Home Page Banner July 23, 2018

Black Hat USA

MESCON Conference
Home Page Banner May 20, 2018

MESCON Conference

GISEC 2018
Home Page Banner

GISEC 2018

LATEST NEWS

Microsoft said that it’s working on a fix for a zero-day flaw in its JET Database Engine. A Microsoft zero-day

Sharp-eyed researchers have spotted a critical vulnerability in numerous surveillance devices from the video management company NUUO. We’ve seen this

The covert banking Trojan DanaBot uncovered by Proofpoint in May 2018 when it began targeting Australia and Poland via malicious

The Port of Barcelona was Thursday morning the target of a cyberattack that affected some of its servers and systems,

A Latvian hacker convicted of crimes relating to running the for-profit malware scanning site “Scan4You” was sentenced to 14 years

The security and privacy issues with APIs and third-party app developers are something that’s not just Facebook is dealing with.

An airport spokesman said the information screens were taken offline early on Friday to contain an attack similar to so-called

In 2016, Apple’s head of security surprised the attendees of one of the biggest security conference in the world by

Hundreds of millions of records were exposed after a MongoDB server belonging to disaster-recovery firm Veeam was left misconfigured, researchers

The airline said information like name, address and bank card details like CVC code were compromised. British Airways said approximately

Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser,

Two high-severity vulnerabilities have been disclosed in Cisco’s security platform that could allow an attacker to gain administrative privileges –

The systems that power the manufacturing, power and water plants, the oil and gas industry, and many other sectors are

A vulnerability in Cisco’s Data Center Network Manager could allow a remote attacker to gain access to sensitive information. The

A new kind of ransomware has been spread by a fake Windows Activator. Although it has now been found and

Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens. Attackers

A pair of Necurs botnet-fueled phishing campaigns were found targeting the banking industry this month, using Microsoft Publisher (.pub) file

According to the company, the attackers did not access payment card data, social security numbers (SSNs) or passwords. However, they

 
 

IT Security

Symantec introduced Email Threat Isolation, a new solution targeting to protect users against spear phishing, credential theft, account takeover and

Dell EMC unveiled its latest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing simple and powerful converged

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

Kaspersky-OS

On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However,

CLOUD SECURITY

Hewlett Packard Enterprise is looking to realign channel partners in Europe around the cloud and shift their mindset from selling

New AES-256 encryption for data at rest, more efficient storage APIs and a revamped Storage Explorer app are among Azure

Citing sources familiar with Apple’s plans, The Wall Street Journal on Tuesday reported that while preparations for a more secure

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...