your market intelligence analyst
Search Results
Edit Save
2,020 results
SC Magazine 10/11/2019 15:12
Juniper Networks this week issued 27 software security advisories covering 84 product vulnerabilities, 31 of them critical. All of the critical flaws were listed in a single security advisory that detailed 53 vulnerabilities in its Contrail Networking cloud network automation product. Two of the bugs were assessed a maximum 10.0 CVSS base score: a path traversal vulnerability…. .
SC Magazine 10/10/2019 16:15
Apple has patched a vulnerability in iCloud for Windows and iTunes for Windows that malicious actors had been exploiting to evade antivirus and endpoint detection and response systems as they attempted to infect machines with ransomware. Specifically, the zero-day flaw was discovered in Bonjour – a mechanism for delivering future updates and also for helping…. .
SC Magazine 10/10/2019 12:04
Twitter this week disclosed that it gave advertisers access to email addresses and phone numbers that users had supplied to the social media messaging platform, originally for two-factor authentication purposes. The company is asserting that this practice was inadvertent. In an online post, Twitter acknowledged that data intended for “safety or security purposes” went to…. .
SC Magazine 10/10/2019 11:35
Nearly a decade after Hillary Clinton began using personal devices and a private email server while Secretary of State – a practice that sparked a heated debate and congressional investigations during the 2016 presidential election cycle – an early impeachment probe into President Trump revealed that diplomats in the administration used WhatsApp and their personal... .
SC Magazine 10/10/2019 11:33
Legislation introduced by House Democrats aims to close loopholes on foreign spending in the U.S. political campaigns to curb election interference. In addition to addressing campaign finance loopholes, the Stopping Harmful Interference in Elections for a Lasting Democracy (SHIELD) Act, introduced by Rep. Zoe Lofgren, D-Calif., chairperson of the Committee on House Administration, includes a…. .
SC Magazine 10/09/2019 17:29
Magecart hackers found out how to get to Sesame Street’s online store – and in all likelihood thousands more merchants – by initially compromising e-commerce and shopping cart service provider Volusion to deliver the credit card-skimming code. Israel-based security researcher Marcel Afrahim, who for his day job works as a research developer at Check Point…. .
SC Magazine 10/09/2019 12:26
A malicious actor used stolen credentials to access a web portal operated by credit reporting agency TransUnion Canada and then used that portal to access consumer files. This week, BleepingComputer posted a report containing scanned images of a disclosure notification that TransUnion Canada has begun mailing out to affected consumers. The notification, dated Sept. 19,…. .
SC Magazine 10/09/2019 12:17
The medical and personal information of about 1 million people was exposed after a breach of Tū Ora Compass Health, a primary health organization (PHO) located in New Zealand. The non-governmental organization (NGO) discovered four intrusions – by what Ministry of Health Director-General of Health Ashley Bloomfield said were two hacktivists and two “more sophisticated…. .
SC Magazine 10/09/2019 09:16
In the wake of a controversial call between President Trump and President Volodymyr Zelensky of Urkaine and even as some of President Trump’s supporters in Congress push a narrative that corrupt forces in Ukraine were behind 2016 election meddling, the second of a five-part bipartisan report from the GOP-led Senate Intelligence Committee confirmed Russia was... .
SC Magazine 10/09/2019 08:00
Traditional security solutions were designed to identify threats at the perimeter of the enterprise, which was primarily defined by the network. Whether called firewall, intrusion detection system, or intrusion prevention system, these tools delivered “network-centric” solutions. Innovation was slow because activity was dictated, in large part, by the capabilities, and limitations, of available technology resources.….
SC Magazine 10/08/2019 17:29
Microsoft Corporation today released its latest batch of security updates, fixing 59 vulnerabilities, nine of them critical. Four of the critical flaws consisted of memory corruption bugs that can surface when the Chakra scripting engine handles certain objects in memory in the Microsoft Edge web browser (CVE-2019-1366, CVE-2019-1307, CVE-2019-1308 and CVE-2019-1335). These flaws can be…. .

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications