Infosecurity News

  1. TfL Suspends Oyster Site After Credential Stuffing Blitz

    Customers encouraged not to reuse passwords

  2. Broadcom Snaps Up Symantec Enterprise Security Biz For $10.7bn

    Existing Symantec business with lose its name but keep Norton products

  3. #BHUSA: Cult of the Dead Cow Members Discuss Hacktivism, Influence & Politicians

    Cult of the Dead Cow reunite to discuss influence and legacy

  4. #BHUSA: DevSecOps, Looking Beyond the Buzzword

    DevSecOps isn't just yet another meaningless buzzword

  5. #BHUSA: How GDPR Can Help Attackers Steal Identities

    A GDPR component was abused to get access to personally identifiable information

  6. #BHUSA Scope of Russia's Dark Web Revealed

    The scale and content of Russian dark web was revealed in new research

  7. #BHUSA Empathy is Key to Hiring and Retaining Women in Cybersecurity

    Rebecca Lynch of Duo Security gave a talk on hiring, and just as importantly retaining, women in the cybersecurity industry.

  8. #BHUSA: Five Years of Google Project Zero Should Influence Similar Groups

    Project Zero boss looks back at five years of research

  9. #BHUSA: Increase Social Media Awareness With Active and Passive Testing

    A new tool enables active social media testing.

  10. #BHUSA: Defending Against Morphing DDoS with SODA

    F5 Labs researchers release a new open source tool and model to help organizations prepare for and defend against an emerging form of disruptive attack.

  11. Researchers Detect Spambot Recording Victims' Screens as They Watch Sexual Content

    Malware-distributing spam campaigns are targeting people in France

  12. FireEye Identifies Prolific Chinese Cyber-Threat Group

    APT41 has targeted various industries across multiple jurisdictions.

  13. Researchers Reveal 35 Flaws in Six Printers

    Sysadmins urged to patch after latest discovery

  14. CafePress Slammed After Major Breach Affecting 23 Million

    Exposed data included unique email addresses and passwords

  15. #BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk

    Reclassifying phishing attacks, and the ways to help users spot them

  16. North Korean Hackers Amass $2bn Via Cyber-Attacks

    Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN

  17. #BHUSA : Open Source is Key to Solving Cyber Skills Gap

    At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry

  18. #BHUSA: Keynote Encourages Positivity and Collaboration

    The Black Hat USA keynote encourages better collaboration and a more positive culture

  19. LokiBot Gets Sneakier With Steganography

    LokiBot is getting stealthier and is now hiding its devastating payload in image files.

  20. IBM's Warshipping Attacks Wi-Fi Networks From Afar

    Forget wardriving; warshipping is a more targeted way to hit a company's wireless network, says IBM.

What’s hot on Infosecurity Magazine?