Microsoft Remote Access Protocol Flaw Affects All Windows Machines Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.
77% of Businesses Lack Proper Incident Response Plans New research shows security leaders have false confidence in their ability to respond to security incidents.
What's the C-Suite Doing About Mobile Security? While most companies have security infrastructure for on-premises servers, networks, and endpoints, too many are ignoring mobile security. They'd better get moving.
Malware Leveraging PowerShell Grew 432% in 2017 Cryptocurrency mining and ransomware were other major threats.
Segmentation: The Neglected (Yet Essential) Control Failure to deploy measures to contain unauthorized intruders is a recipe for digital disaster.
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis Researchers at Black Hat Asia will demonstrate a new framework they created for catching and studying Apple MacOS malware.