VMware releases security patches for a critical virtual machine escape flawSecurity Affairs

VMware released security patches for a critical virtual machine (VM) escape vulnerability that was recently discovered at a Chinese hacking contest. VMware has...

Symantec Data Strengthens Context for Anomali Threat Platform

Anomali solves that by using security, network, and threat data from a variety of sources to give companies additional context and more reliable threat intelligence. We take everything coming in, give...

Learn to play defense by hacking these broken web apps

The best way to learn to play defense is to play offense, and the OWASP Broken Web Applications Project makes it easy for application developers, novice penetration testers, and security-curious...

When your Instagram account has been hacked, how do you get it back?

A travel blogger, with more than 100,000 followers on Instagram, has described how her account was wiped after she refused to hand over hundreds of dollars worth of Bitcoin to...

Introducing the Android Ecosystem Security Transparency Report

Posted by Jason Woloz and Eugene Liderman, Android Security & Privacy TeamUpdate: We identified a bug that affected how we calculated data from Q3 2018 in the Transparency Report. This...

Hey there! How much are you worth?

Have you ever stopped to think just how much your life is worth? I mean really think about it. For instance, let’s say you wanted to sell everything you have...

Flaw Leads to RCE in WordPress Plugins, WooCommerce

A WordPress design flaw could grant an attacker remote code execution, leading to a privilege escalation in WooCommerce and other WordPress plugins, according to RIPS Technologies. In a 6 November blog post,...

US Air Force announced Hack the Air Force 3.0, 3rd Bug Bounty ProgramSecurity Affairs

The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the Air Force...

Splunk: Integrating for Better Threat Recognition

Security operations centers are drowning in data. More than half of all companies—55 percent—have to deal with more than 10,000 alerts every day. This deluge leaves 74 percent of IT...

Remember: It’s not all about the 1s and 0s

So many businesses focus their security efforts on the technology: preventing successful phishing attacks, data breaches, intellectual property theft, etc. Unfortunately, those same businesses often overlook the critical role that...

LATEST NEWS

MUST READ