Category: News
Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19
At Black Hat USA this week, VMware Carbon Black unveils findings from the fifth installment of the semiannual Global Incident Response Threat Report, entitled: “COVID-19 Continues to Create a Larger […]Source Code Leak – What We Learned and How You Can Protect Your IP
The latest leak appears to stem primarily from a misconfiguration of SonarQube, an open-source tool for static code analysis, which allows developers to audit their code for bugs and vulnerabilities prior […]Announcing the Seventh Annual Flare-On Challenge
The FireEye Labs Advanced Reverse Engineering (FLARE) team is honored to announce that the popular Flare-On challenge will return for a triumphant seventh year. Ongoing global events proved no match against […]Privilege Escalation on Meetup.com Enabled Redirection of Payments
As a result of our investigations, which are further detailed in this technical report, we found several “more-common” API security issues like Lack of Resources & Rate Limiting and Excessive […]Cofense Expands SOAR Integration Partners to Accelerate Phishing Incident Response
LEESBURG, Va., Aug. 3, 2020 – Cofense®, the global leader in intelligent phishing defense solutions, today announced enhanced phishing analysis integrations with Cofense TriageTM and Cofense IntelligenceTM to further complement […]Reduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrust
Reduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrust July 31, 2020 Open You May Also Be Interested In: Our website uses cookies to […]NO PAIN, NO GAIN – McAfee Q3 Technical Webinars
Are you a McAfee Partner and working with McAfee in a technical role? Then these McAfee EMEA Channel Tech Sessions are for you. Does your job involve McAfee solutions, and do […]GRUB2 Boothole Buffer Overflow Vulnerability (CVE-2020-10713) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR®
On July 29, 2020, Eclypsium researchers disclosed a high-risk vulnerability in GRUB2 (GRand Unified Bootloader version 2) affecting billions of Linux and Windows systems, even when secure boot is enabled. […]SD-WAN or WAN Optimization? | Riverbed
SD-WAN or WAN Optimization? I love that question. And, in order to answer it correctly, let me first dispel a common misperception. The question assumes SD-WAN and WAN Optimization are […]How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ
How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ POSTED BY LIZ BUSH Mention the name “Airbus” and many people think of aircraft, particularly the iconic A380 – […]Load More