First released in 1997, L0phtCrack can be used to test password strength and recover lost Windows passwords via dictionary, brute-force, and other types of attacks. L0phtCrack was originally developed by Peiter Zatko, also known as Mudge, of the L0pht hacker think tank. L0pth then merged with @stake, which was acquired by Symantec in 2004. It…

The latest funding round was led by General Catalyst, with participation from Mayo Clinic, AVG Basecamp Fund, Accenture Ventures, Clocktower Technology Ventures, Dolby Family Ventures, Flyover Capital, KCRise Fund, NextGen Venture Partners, and Wavemaker Three-Sixty Health. The Kansas City, Missouri-based company provides a private data sharing solution designed to enable enterprises to collaborate with others…

First discovered in January this year, Necro Python is also tracked as N3Cr0m0rPh, FreakOut, Python.IRCBot and is known for attempting to exploit multiple known vulnerabilities. In late September, the botnet added to its arsenal an exploit targeting a security vulnerability in Visual Tools DVR VX16 4.2.28.0, according to a warning from Juniper Threat Labs. Based…

A total of nine cybersecurity-related acquisitions were announced in the first 10 days of October 2021. 11:11 Systems acquires Green Cloud Defense Managed infrastructure solutions provider 11:11 Systems acquired Green Cloud Defense, a cloud infrastructure-as-a-service provider that specializes in managed cloud security solutions. The deal will help 11:11 Systems expand its capabilities and grow its…

Featuring support for the FIDO2/WebAuthn and U2F protocols, YubiKey Bio Series leverages fingerprint recognition to enable users to securely log in to their accounts using a second factor or without passwords at all. The new security keys support the biometric enrollment and management features that have been implemented in modern platforms and operating systems. According…

The pilot program financially rewards developers who help improve the security of critical open source projects and is meant to complement existing vulnerability management programs. Committed to boost the security of the open source ecosystem, the Internet search giant recently pledged $100 million in support for projects that aim to fix vulnerabilities in open source…

Robotic Process Automation (RPA) is one of the key technologies fueling digital transformation. Ranked by industry experts as one of the fastest-growing enterprise software categories, RPA is helping businesses and their employees achieve the efficiency, accuracy and speed needed to compete and thrive. By approaching RPA automation projects and cybersecurity hand in hand, organizations can…

The Federal Trade Commission (FTC) commissioners, in a split-vote (3-2), issued a policy statement on September 15, requiring both health applications and connected devices to comply with the “Health Breach Notification Rule (August 2009).” The commissioners recognized how the applications and devices did not fall within the scope of the Health Insurance Portability and Accountability…