Saturday, February 23, 2019
           (757) 873-6707                     Monday - Friday, 9 am - 5:30pm
Prepare to Defend Your Network Against Swarm-as-a-Service Swarm technology may be a game changer for the bad guys if organizations don’t change their tactics.
2019 and Beyond: The (Expanded) RSAC Advisory Board Weighs in on What’s Next: Pt. 2 Part two of RSA’s Conference Advisory Board look into the future tackles how approaches to cybersecurity must evolve to meet new emerging challenges.
Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices A report found that a dozen connected devices are open to several security and privacy issues.
2019 and Beyond: The (Expanded) RSAC Advisory Board Weighs in on What’s Next Forward-thinking predictions for the year ahead from some of the cybersecurity industry’s wisest minds.

Latest News

Researcher: Not Hard for a Hacker to Capsize a Ship at Sea

Capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners.

Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phish

An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.

Apple’s Shazam App Boots Facebook Ads and Other Third-Party SDKs

The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

1Password, Dashlane, KeePass and LastPass each downplay what researchers say is a flaw in how the utilities manage memory.

GitHub Increases Rewards, Scope For Bug-Bounty Program

GitHub is offering unlimited rewards for critical vulnerabilities - and has added \\"safe harbor\\" terms to its bug bounty program.

Microsoft: Russia’s Fancy Bear Working to Influence EU Elections

As hundreds of millions of Europeans prepare to go to the polls in May, Fancy Bear ramps up cyber-espionage and disinformation efforts.

Microsoft to Kill Updates for Legacy OS Using SHA-1

Windows 7 and Windows Server 2008 users are being asked to upgrade their encryption support.

ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom

Russia-linked actors need just 18 minutes to go from compromise to lateral movement.

New GandCrab Decryptor Unlocks Files of Updated Ransomware

This is the third update to the prolific GandCrab malware within the past year.

ATM Jackpotting Malware Hones Its Heist Tools

The WinPot malware takes its cues from slot machines.