News Wrap: PoC Exploits, Cable Haunt and Joker Malware

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week’s news wrap. Continue reading News Wrap: PoC Exploits, Cable Haunt and Joker Malware

The top telco conferences and trends shaping our future

For those of you that may not know about Allot, we’re a leading provider of cybersecurity solutions for communication service providers and innovative network intelligence for both service providers and enterprises all over the world. We help top… Continue reading The top telco conferences and trends shaping our future

DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ISPs to tell them the true identities… Continue reading DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info