DeepLocker: new breed of malware that uses AI to fly under the radar

IBM researchers are seeking to raise awareness that AI-powered threats are coming our way soon. To that end, they’ve created an all-new breed of malware to provide insights into how to reduce risks and deploy adequate countermeasures. DeepLocker … Continue reading DeepLocker: new breed of malware that uses AI to fly under the radar

Vulnerabilities in mPOS devices could lead to fraud and theft

Vulnerabilities in mPOS (mobile point-of-sale) machines could allow malicious merchants to defraud customers and attackers to steal payment card data, Positive Technologies researchers have found. The use of mPOS devices has seen huge growth over the l… Continue reading Vulnerabilities in mPOS devices could lead to fraud and theft

Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool takes advantage of facial recognition technology and searches for targets&#82… Continue reading Social Mapper: A free tool for automated discovery of targets’ social media accounts

IoT malware found hitting airplanes’ SATCOM systems

In 2014, IOActive researchers revealed security vulnerabilities they found in the most widely deployed satellite communications terminals and presented potential scenarios attackers could exploit once SATCOM systems have been compromised in the aviatio… Continue reading IoT malware found hitting airplanes’ SATCOM systems

Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits

Crowdfense announced the launch of their Vulnerability Research Platform (VRP). This web-based collaboration platform allows vulnerability researchers to safely submit, discuss and quickly sell single 0day exploits and chains of exploits. The VRP will … Continue reading Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits

WhiteSource unveils free open source Vulnerability Checker

WhiteSource announced the release of its Vulnerability Checker, a free tool that provides companies with immediate, real-time alerts on the 50 most critical open source vulnerabilities published in the open source community. The new standalone CLI tool… Continue reading WhiteSource unveils free open source Vulnerability Checker

Securely launch your IoT-related services, devices, platforms, apps

Irdeto has introduced the latest version of Cloakware Software Protection to enable any IoT connected business to take advantage of and securely launch IoT-related services, devices, platforms, applications and more. Irdeto Cloakware Software Protectio… Continue reading Securely launch your IoT-related services, devices, platforms, apps

Proofpoint launches TAP Isolation, threat detection, and Threat Response python scripting

Proofpoint announced three people-centric security innovations, including Targeted Attack Protection (TAP) Isolation for personal webmail and browsing defense, threat detection, and new Threat Response python scripting. “Exceptional effectiveness in th… Continue reading Proofpoint launches TAP Isolation, threat detection, and Threat Response python scripting

eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises

eSentire and Cyxtera Technologies announced a partnership to bring customers security solutions designed to secure today’s hybrid IT environment. The partnership combines eSentire’s 24×7 MDR with Cyxtera’s AppGate SDP zero-trust network offering, … Continue reading eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises

Photo gallery: Black Hat USA 2018, part 2

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, Sonicwall, LookingGlass.
The post Photo gallery: Black Hat USA 2018, part 2 appea… Continue reading Photo gallery: Black Hat USA 2018, part 2