Cybercrime | News, how-tos, features, reviews, and videos
Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.
From now on, 'hackers' should refer to white hats instead of black hats.
Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.
Its ability to unmask phishing and social engineering attacks based on context truly sets it apart.
It would not be an inaccurate description to call Risk Fabric a next-generation vulnerability management tool. By adding real context to raw scan results, IT teams are given a much better picture of the true risks hiding within their networks.
The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed.
With its Deception and Response Platform, Attivo Networks addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network.
Dealing with too many threat feeds exemplifies that old proverbial wisdom that too much of a good thing can become a bad thing. That's where ThreatConnect comes in.
The Bitdefender Hypervisor Introspection (HVI) tool sits below the hypervisor and prevents any of these tactics such as buffer overflows, heap sprays, code injection and API hooking from executing, protecting the virtual browser from ever becoming co
PasswordsFAST: not so fast.