Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 1 to 10
3 Strategies For Building An Information Protection Program
25th Jun 2019 [28 hours ago] from Microsoft
Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices. The post 3 strategies for building...
Tracing The Supply Chain Attack On Android
25th Jun 2019 [30 hours ago] from Krebsonsecurity
Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didnt exactly name those responsible, but said it...
Using Whitelisting To Remediate An RCE Vulnerability (CVE-2019-2729) In Oracle WebLogic
25th Jun 2019 [33 hours ago] from TrendMicro
Oracle WebLogic has recently disclosed and patched remote-code-execution (RCE) vulnerabilities in its software, many of which were due to insecure deserialization. Oracle addressed the most recent vulnerability, CVE-2019-2729, in an out-of-band...
Stopping Stalkerware: What Needs To Change?
25th Jun 2019 [35 hours ago] from ESET Research
What technology makers and others can – and should – do to counter the kind of surveillance that starts at home The post Stopping stalkerware: What needs to change? appeared first on WeLiveSecurity
Hackers Breach NASA, Steal Mars Mission Data
24th Jun 2019 [48 hours ago] from ESET Research
The infiltration was only spotted and stopped after the hackers roamed the network undetected for almost a year The post Hackers breach NASA, steal Mars mission data appeared first on WeLiveSecurity
5 Principles Driving A Customer-obsessed Identity Strategy At Microsoft
24th Jun 2019 [2 days ago] from Microsoft
The cloud era has fundamentally changed the way businesses must think about security and identity. Learn the five principles driving the customer-obsessed identity strategy at Microsoft. The post 5 principles driving a customer-obsessed...
Inside Out: Get To Know The Advanced Technologies At The Core Of Microsoft Defender ATP Next Generation Protection
24th Jun 2019 [2 days ago] from Microsoft
While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. Multiple next-generation protection engines...
CVE-2019-8635: Double Free Vulnerability In Apple MacOS Lets Attackers Escalate System Privileges And Execute Arbitrary Code
21st Jun 2019 [5 days ago] from TrendMicro
We discovered a double free vulnerability (assigned as CVE-2019-8635) in macOS. The vulnerability is caused by a memory corruption flaw in the AMD component. If successfully exploited, an attacker can implement privilege escalation and...
Privacy Legislation May Soon Affect Smaller Businesses
21st Jun 2019 [5 days ago] from ESET Research
Why smaller businesses cannot afford to ignore how they gather, store and protect data The post Privacy legislation may soon affect smaller businesses appeared first on WeLiveSecurity
The Evolution Of Microsoft Threat Protection, June Update
20th Jun 2019 [6 days ago] from Microsoft
Learn about new Microsoft Threat Protection capabilities now in public preview. The post The evolution of Microsoft Threat Protection, June update appeared first on Microsoft Security.
1 2 3 4 5 6 7 8 9 10 Older »