April 23, 2019 | Javvad Malik

Security through transparency

There are many things within Information security that pundits have been claiming are dead, or should be killed by fire - passwords are usually found at the centre of such debates. But this isn’t a post about passwords, it’s a post about honesty, and trust. But let’s first take a look at the other…

April 18, 2019 | Karoline Gore

Ethical hacking as a post-graduation opportunity

The world of cybersecurity is an ever-changing one of constant preemptive preparation, where companies are forced to hunt for any kinks in their defenses to ensure that they’re as protected as possible. Working as an ethical hacker allows information technology graduates to come into the job market and aid companies in finding those kinks so that…

Get the latest security news in your inbox.

Subscribe via Email

April 17, 2019 | Joe Robinson

Siegeware and BAS attacks, an emerging threat

As technological solutions to cybercrime become increasingly advanced, able to preempt attacks and weed out vulnerabilities before they’re widely known, attackers also  become more adept at cloaking their presence and concealing their intent. The targets of attacks also change with the times. Hacking websites and bank accounts is old-hat, some of the most threatening dangers to the…

April 16, 2019 | Mike Klepper

Security is Simple as 1, 2, 3

Keeping an organization’s IT assets secure in this day and age is a challenge.  The sands of the information security landscape are constantly shifting, and it can be difficult for practitioners to find solid footing; to identify those initiatives that will net the greatest return on security spend.  Each day seems to bring another emerging concern…

April 15, 2019 | Roger Thornton

3 enemies - the $96B in cyber crime that nobody wants to talk about

They say that bad things always come in threes. The adage may testify to little but the popularity of superstition, but for security executives today, this notion regrettably passes muster.  Crime, complexity and cost are three foes that every CISO must face, and while most companies think crime is the enemy, in many cases it is the latter two…

April 12, 2019 | Javvad Malik

Things I hearted this week 12th April 2019

Hello again to another weekly security roundup. This week, I have a slightly different spin on the roundup in that the net has been slightly widened to include broader technology topics from more than just this last week. However, all of the articles were written by ladies. With that, let’s dive straight in. A beginner's guide to…

April 11, 2019 | Jeff Thompson

DNS cache poisoning part 2

My last blog on DNS cache poisoning only covered the superficial aspects of this long-standing issue. This installment aims to give a bit more technical detail, and expose some of the tactics used by the "bad-actors" looking to leverage a poisoned DNS cache against you and your network. In a worst-case scenario, the results of a poisoned DNS cache could…

April 8, 2019 | Rich Langston

Understanding “container security”

Containers and container security Do you docker? Without a doubt, containers are one of the hottest concepts in application delivery and security these days. And that’s a very good thing. Containers have tremendous advantages over the way we have done things in the past. But how should containers influence a threat detection and response strategy? Do I need…

April 5, 2019 | Javvad Malik

Things I hearted this week, 5th April 2019

Hello again, back to your regularly scheduled weekly security news, views, and opinions roundup. So without further ado, let’s jump straight into it. Pwned GPS eatches A German security researcher has printed the word "PWNED!" on the tracking maps of hundreds of GPS watches after the watch vendor ignored vulnerability reports for more than a year, leaving thousands…

April 3, 2019 | Devin Morrissey

Online reputation management: how to control what’s out there

Your reputation is one of the most powerful assets you can have as a successful businessperson. Having a reputation for honesty and quality can be the key to locking down major clients or building a standing in a fledgling market. Alternatively, having a poor reputation can be detrimental to the point of completely running you out of business. In this…

April 2, 2019 | Tom Hegel

Xwo - A Python-based bot scanner

Jaime Blasco and Chris Doman collaborated on this blog. Overview: Recently, AT&T Alien Labs identified a new malware family that is actively scanning for exposed web services and default passwords. Based on our findings we are calling it “Xwo” - taken from its primary module name. It is likely related to the previously reported malware families…

April 2, 2019 | Gabriel Avner

Information on open source vulnerabilities is as distributed as the community

Nothing gets the AppSec / InfoSec community abuzz quite like a good old 0-day vulnerability. I mean, what’s not to love here? These vulnerabilities involve the thrill of adversaries knowing something we don’t, giving them a path to sail through our defenses to break into that sweet data inside. They are the James Bond of the security…

Watch a Demo ›
Get Price Free Trial