A new tool enables active social media testing.
From On-Prem to Cloud: The Complete AWS Security Checklist
This complete AWS cloud auditing security checklist outlines what it takes to protect sensitive data center security & intellectual property when securing an organization?s cloud deployment.
#BHUSA: Defending Against Morphing DDoS with SODA
F5 Labs researchers release a new open source tool and model to help organizations prepare for and defend against an emerging form of disruptive attack.
Researchers Detect Spambot Recording Victims’ Screens as They Watch Sexual Content
Malware-distributing spam campaigns are targeting people in France
FireEye Identifies Prolific Chinese Cyber-Threat Group
APT41 has targeted various industries across multiple jurisdictions.
Researchers Reveal 35 Flaws in Six Printers
Sysadmins urged to patch after latest discovery
CafePress Slammed After Major Breach Affecting 23 Million
Exposed data included unique email addresses and passwords
#BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk
Reclassifying phishing attacks, and the ways to help users spot them
North Korean Hackers Amass $2bn Via Cyber-Attacks
Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN
#BHUSA : Open Source is Key to Solving Cyber Skills Gap
At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry