
Review: Cato Cloud
The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato …

Navigating GDPR in the mobile enterprise
Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

How large businesses approach cybersecurity today
Over 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats. Clutch surveyed over 300 …

BH Consulting launches scholarship programme to address infosec skills gap
BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under …

Week in review: Cyber threat hunting, Android DDoS botnet, drone bug bounty
Here’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails …

Canadian university scammed out of $11.8 million
MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers. “On Wednesday, August 23, MacEwan University discovered it had been the victim of a …

Locky ransomware returns with new tricks up its sleeve
Locky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam …

The real cost of alarm fatigue
One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

What’s the use of a privacy policy?
In 2012 it was reported that “16% of Internet users claim to always read privacy policies of the sites and online services with which they share their private …

New infosec products of the week: September 1, 2017
Palo Alto Networks announces Next-Generation Security Platform for VMware Cloud on AWS Palo Alto Networks announced its Next-Generation Security Platform is available to …

Stealthy backdoor used to spy on diplomats across Europe
A new, sophisticated backdoor Trojan has been used to spy on targets in embassies and consulates across Southeastern Europe and former Soviet Union republics. ESET researchers …

Attackers exploited Instagram API bug to access users’ contact info
Instagram has confirmed that “one or more individuals obtained unlawful access to a number of high-profile Instagram users’ contact information — specifically …
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects