News

Upcoming Events

Black Hat Spring Training
2021-03-15 | 2021-03-18
Format: 2 Day Training. Skill Level: Intermediate/Advanced The Black Hat Trainings offer attendees deeply technical hands-on courses on topics ranging from broader offensive security to the latest in penetration testing, infrastructure hacking, etc.
...Read more

Black Hat Asia 2021
2021-05-04 | 2021-05-07
Black Hat Asia will be held virtually in the Singapore Time Zone, May 4-7. During this week, information security experts will teach interactive, online Trainings, innovative research will be presented at Briefings, the latest open-source tools...
...Read more

Black Hat USA 2021
2021-07-31 | 2021-08-05
Mandalay Bay Convention Center, Las Vegas
...Read more

Black Hat Europe 2021
2021-11-08 | 2021-11-11
more info to come
...Read more

Universities Face Double Threat of Ransomware, Data Breaches
Lack of strong security policies put many schools at risk of compromise, disrupted services, and collateral damage....Read more

Know Thy Assets: The First Step in Securing Your Industrial Environment
Maximize defense of critical industrial environments through comprehensive and detailed inventory of assets....Read more

Cisco Warns of Critical Auth-Bypass Security Flaw
Cisco also stomped out a critical security flaw affecting its Nexus 3000 Series Switches and Nexus 9000 Series Switches....Read more

Setting Up an Effective Vulnerability Management Policy
It’s no surprise that enterprise investment in vulnerability management is on the rise....Read more

Think Macs Don’t Get Malware? Think Again.
Seriously, does anyone still believe that? Actualy, yes....Read more

How to Secure Your Cloud Investment
As you invest in more cloud-based solutions, you need to continuously evaluate how security is involved and managed...Read more

Hacking for Dollars: North Korean Cybercrime
Sealed indictment charging three North Korean (DPRK) hacking “operatives” with a plethora of cybercrimes...Read more

Industrial Control Systems: The New Target of Malware
Adversarial groups have been creating ICS & SCADA-focused malware. TRITON designated the “world’s most murderous mal...Read more

1Password has none, KeyPass has none...
So why are there seven embedded trackers in the LastPass Android app?...Read more

What’s most interesting about the Florida water system hack?
That we heard about it at all....Read more

NSA urges system administrators to replace obsolete TLS protocols
NSA: Obsolete encryption provides a false sense of security....Read more

Attackers Exploit Poor Cyber Hygiene to Compromise Cloud Security Environments
Threat actors used a variety of tactics and techniques, including phishing and brute force logins, to attempt to exploit...Read more

Sealed U.S. Court Records Exposed in SolarWinds Breach
The ongoing breach may have jeopardized the privacy of countless sealed court documents on file with the U.S....Read more

Slack Restores Service After Starting 2021 With Outage
The company apologized for the disruptions, which lasted for a few hours as users returned to work after the holidays....Read more