Please turn on your JavaScript for this page to function normally.
Expected cyber threats over the next six months

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, …

danger
CrowdStrike launches malware search engine

CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. …

Qualys CloudView
Qualys CloudView to deliver continuous security of public cloud infrastructure

Qualys announced CloudView, a new app framework in the Qualys Cloud Platform for comprehensive and continuous protection of cloud infrastructure, delivering InfoSec and …

Facepalm
6+ billion records exposed in data breaches in first half of 2017

There have been 2,227 publicly disclosed data compromise events since the beginning of the year through June 30th, according to Risk Based Security. While this is in keeping …

Circle eye
MacOS malware used to spy on home users in the US

A new variant of the macOS malware Fruitfly has been found by security researcher Patrick Wardle on some 400 machines of (mostly) home users located in the US. Fruitfly: The …

Users lock
Google Groups misconfiguration leads to sensitive data leaks

If your employees are using Google Groups to discuss issues and ideas, you might want to check whether the sharing setting for these groups is set to “Private”. …

hand
UK govt urges teenagers to apply for cyber security training programme

UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …

Magnify
Custom code accounts for 93% of application vulnerabilities

Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …

ADAC test
Testing the security of connected cars and IoT devices

IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …

architecture
The future of AppSec: Stop fighting the last war

It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true …

Qualys CertView
Manage SSL/TLS certificates across IT environments with Qualys CertView

Qualys announced CertView, a new app framework in the Qualys Cloud Platform that enables customers to discover, assess and manage SSL/TLS certificates on a global scale, …

Google Play Protect
Google Play Protect scans for malicious apps

By now, many Android users that have the Google Play Store app on their devices should be able to find Google Play Protect in it. What is Google Play Protect? Google Play …

Don't miss

Cybersecurity news