New IoT Security Bill: Third Time’s the Charm?

The latest bill to set security standards for connected devices sold to the US government has fewer requirements, instead leaving recommendations to the National Institute of Standards and Technology.

New Europol Protocol Addresses Cross-Border Cyberattacks

The protocol is intended to support EU law enforcement in providing rapid assessment and response for cyberattacks across borders.

Dragos Buys ICS Firm with US Dept. of Energy Roots

NexDefense ICS security tool will be offered for free by Dragos.

Slack rolls out enterprise key management, but has no plans for end-to-end encryption

Are You Prepared for a Zombie (Domain) Apocalypse?

When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.

Don’t Miss these Intriguing Black Hat Asia Briefings

With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!

Don’t Miss these Intriguing Black Hat Asia Briefings

With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!

7 Low-Cost Security Tools

Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.

Could Beto O’Rourke Become the First Hacker President?

New report details the Democratic candidate's time as a member of Cult of the Dead Cow.

Proof-of-Concept Tracking System Finds RATs Worldwide

Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.