This Week in Security News: Cybersecurity Skills Gap and Legislature

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 29 Mar 2019 14:00:16 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the cybersecurity skills gap is affecting organizations. Also, learn how a bipartisan bill is working to close the gap. Read on: What Hacker History Can…

The post This Week in Security News: Cybersecurity Skills Gap and Legislature appeared first on .

Read more

This Week in Security News: Risky Radio Remotes and Cybercrime

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new research on radio frequency technology and the risks of radio remote controllers. Also, understand why there is a rise in physical crime…

The post This Week in Security News: Risky Radio Remotes and Cybercrime appeared first on .

Read more

This Week in Security News: Holiday Cybercriminals & Cryptomining Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Nov 2018 15:21:25 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November’s online shopping season. Also, see the different cryptomining malware affecting Linux systems and…

The post This Week in Security News: Holiday Cybercriminals & Cryptomining Malware appeared first on .

Read more

Sharing research and discoveries at PWN2OWN

Credit to Author: Windows Defender Research| Date: Wed, 14 Mar 2018 23:58:49 +0000

The annual PWN2OWN exploit contest at the CanSecWest conference in Vancouver, British Columbia, Canada, brings together some of the top security talent from across the globe in a friendly competition. For the participants, these events are a platform to demonstrate world-class skills and vie for significant cash prizes. For companies like Microsoft, where we have

Read more

Read more

The Results – Pwn2Own Day Three

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Sat, 18 Mar 2017 02:59:00 +0000

Our final day of Pwn2Own 2017 came to a close with some amazing research. The contest had never previously required a 3rd day of competition, but with our largest ever number of registrations, coinciding with our 10th anniversary, extending to include the extra entries proved more than worthwhile. Just today, we awarded $250,000 and 54…

Read more

Pwn2Own 2017 – Day Three Schedule and Results

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Fri, 17 Mar 2017 00:07:09 +0000

The third and final day of the largest Pwn2Own shapes up with four entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day Three: 9:00am – 360 Security (@mj011sec) targeting Microsoft Edge with a SYSTEM-level escalation and a virtual machine escape…

Read more

The Results – Pwn2Own 2017 Day One

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 16 Mar 2017 09:10:43 +0000

The first day of Pwn2Own 2017 has come to a close, and so far, we’ve awarded $233,000 USD and 45 points for Master of Pwn. Today saw five successful attempts, one partial success, two failures, and two entries withdrawn. Our day started with the 360 Security team successfully using a jpeg2000 heap overflow, a Windows…

Read more

Pwn2Own 2017 – Day Two Schedule and Results

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 16 Mar 2017 00:03:58 +0000

With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today’s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe products. Track Two focuses on products from Apple and Mozilla. This allows ZDI to get through twice the number of contestants in a single day…

Read more