Google offers high-risk Chrome users additional scanning of risky files

Google is providing a new “risky files” scanning feature to Chrome users enrolled in its Advanced Protection Program (APP). About the Advanced Protection Program Google introduced the Advanced Protection Program in 2017. It’s primaril… Continue reading Google offers high-risk Chrome users additional scanning of risky files

Study of global hackers and the economics of security research

Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneu… Continue reading Study of global hackers and the economics of security research

UPnP vulnerability lets attackers steal data, scan internal networks

A vulnerability (CVE-2020-12695) in Universal Plug and Play (UPnP), which is implemented in billions of networked and IoT devices – personal computers, printers, mobile devices, routers, gaming consoles, Wi-Fi access points, and so on – may… Continue reading UPnP vulnerability lets attackers steal data, scan internal networks

Drones Can Undertake Excavations Without Human Intervention

Researchers from Denmark’s Aarhus University have developed a method for autonomous drone scanning and measurement of terrains, allowing drones to independently navigate themselves over excavation grounds. The only human input is a starting location and the desired cliff face for scanning.

For researchers studying quarries, capturing data about gravel, walls, …read more

Continue reading Drones Can Undertake Excavations Without Human Intervention

Camera and Code Team Up to Make Impossible Hovering Laser Effect

Right off the bat, we’ll say that this video showing a laser beam stopping in mid-air is nothing but a camera trick. But it’s the trick that’s the hack, and you’ve got to admit that it looks really cool.

It starts with the [Tom Scott] video, the first one after …read more

Continue reading Camera and Code Team Up to Make Impossible Hovering Laser Effect

Healthcare industry at greatest risk of data breach

The healthcare industry has significantly more exposed attack surfaces than any other industry surveyed, according to Censys’s research findings of cloud risks and cloud maturity by industry, revealed at RSA Conference 2020. Leveraging the Censys… Continue reading Healthcare industry at greatest risk of data breach

IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781

Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via CVE-2019-19781. Finding evidence of compromise By now it should be widely known that … Continue reading IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781

Vulnerability Management Program Best Practices

An enterprise vulnerability management program can reach its full potential when it is built on well-established foundational goals that address the information needs of all stakeholders, when its output is tied back to the goals of the enterprise and … Continue reading Vulnerability Management Program Best Practices