Ahmad Halabi, Managing Director (UAE), Resecurity, tells Anita Joseph, Editor, Security Advisor about the company’s participation at Black Hat and …
Biggest ransomware threat is the network: Vectra
Vectra, network threat detection and response (NDR) solutions provider, has disclosed that cybercriminals’ most effective weapon in a ransomware attack …
Spam most used conduit for distributing malware: report
Mimecast’s Threat Intelligence Report: Black Hat Edition 2019, revealed that attackers are using either simple, opportunistic attacks or complex, targeted attacks based on necessity to impact the target.
SIM card hack has severe implications for business
The impact of hacked SIM cards, one of the few stalwarts in the high-tech industry that has not seen a serious exploit, could be monumental.
SIM cards vulnerable to hacking, says researcher
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.
New Java flaw found in days, sells on black web
Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming …
New tool to bypass web app firewall released
A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at …