Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Larry Loeb Author, | 1/14/2020
On December 17, 2019, Mikhail Klyuchnikov of Positive Technologies announced, along with Citrix, that he had found and verified a vulnerability (CVE-2019-19781) in the Citrix ADC and Citrix Gateway products (which had previously been called NetScaler ADC and NetScaler Gateway). Exploitation of it could lead to code execution without authentication and ...
Cover Image
Larry Loeb Author, | 1/3/2020
Rowhammer is the name of a group of hardware-based attacks that focus on the memory of a computer. Researchers have known since the middle of the last decade that doing a high-rate repeated reading of a data cell inside a memory chip can have deleterious effects on the contents of the cell due to the electrical design of the chip.
Cover Image
Larry Loeb Author, | 12/18/2019
Peleg Hadar of SaveBreach Labs has posted about the vulnerability he found in Intel's Rapid Storage Technology Service (CVE-2019-14568). Intel has released a patch for the bug, and credits Hadar for its discovery in the security advisory that accompanies it.
Cover Image
Larry Loeb Author, | 12/16/2019
International researchers have discovered a major hardware vulnerability that they call Plundervolt in most of the modern Intel processors from Skylake onward. It can allow the changing of information that is supposedly stored as secure in the chip's Secure Enclave.
Cover Image
Larry Loeb Author, | 12/12/2019
Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting that was commissioned by Dell.
Cover Image
Larry Loeb Author, | 11/26/2019
Security researchers Daniel Prizmant, Guy Meoded, Freddy Ouzan and Hanan Natan, who work at endpoint protection firm Nyotron, have found a way that ransomware can bypass the protections which operating system vendors have built into their products. Other software products that try and stop ransomware are also affected by the exploit.
Cover Image
Larry Loeb Author, | 10/29/2019
Absolute, a security firm based in Vancouver, Canada, has issued a disturbing 2019 Endpoint Security Trends Report that finds "much of endpoint security spend is voided because tools and agents fail, reliably and predictably."
Cover Image
Larry Loeb Author, | 10/4/2019
FireEye has written a blog about what they observed financially motivated threat actors were doing that focused on disrupting business processes by the mass deployment of ransomware throughout a victim's environment. FireEye researchers James Wyke and Jeremy Kennelly say these ransomware campaigns have been accompanied with multi-million-dollar ransom ...
Cover Image
Larry Loeb Author, | 8/26/2019
Most people think of the National Security Agency as the home of operational intelligence gathering. But many people are unaware of the research that it has done and released to the public. The Security Enhanced Linux module is one older but still quite viable example. Ghidra is a malware reverse-engineering open source tool, that was released as open ...
discussion board
Markowete
Markowete, 1/28/2020 1:37:07 PM
≤≈≥ INDIA +91-9694510151 INter caste love marriage problem solution IN Guwahati.Solapur
gipertox N+DmuD.50D degrees

Post Your Reply
Chat
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with