Please turn on your JavaScript for this page to function normally.
email
Enterprises face 3,680 potential phishing emails each week

GreatHorn analyzed more than 3.5 terabytes of data – over 373 million corporate emails – to gain insights into the sheer volume of email threats facing enterprises …

dark web mapped
Security analytics and operations are becoming more difficult

A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …

Verizon
Exposed Verizon customer data could be a shortcut for hijacking many online accounts

Chris Vickery, director of cyber risk research at UpGuard, has discovered more sensitive information exposed on an unprotected “bucket” on an Amazon AWS server. …

world
EternalBlue vulnerability scanner statistics reveal there are exposed hosts worldwide

After the recent massive WannaCry ransomware campaign, Elad Erez, Director of Innovation at Imperva, was shocked at the number of systems that still sported the Microsoft …

Katyusha
Telegram-based Katyusha SQL injection scanner sold on hacker forums

Despite regularly achieving one of the top spots on the OWASP Top 10 list of the most critical web application security risks, injection vulnerabilities continue to plague …

payment card
How Magecart attackers monetize stolen payment card info

The Magecart campaign, aimed at compromising online shops with malicious JavaScript code to collects payment card info, is still going strong, and researchers have pinpointed …

money
The future of payments: sensor fingerprinting, facial recognition, retinal scanning and voice control

Viewpost surveyed a cross-section of 1,000 U.S.-based consumers, finding that overall, 80 percent of Americans are in support of payments technologies and currencies, …

100
Constant availability: Mission-critical business data challenges

In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information …

industry
What will it take to improve the ICS patch process?

While regular patching is indisputably good advice for IT networks, one of the main takeaways from the Petya and WannaCry attacks is that a lot of companies don’t do it. And …

connection
Event-driven architecture to become essential skill

Achieving broad competence in event-driven IT will be a top three priority for the majority of global enterprise CIOs by 2020, according to Gartner. Defining an event-centric …

hand
Telecoms don’t protect users from government overreach

The data stored on our mobile phones, laptops, and especially our online services can, when aggregated, paint a detailed picture of our lives—where we go, who we see, what we …

Trojan
Swiss users targeted with Windows, macOS banking Trojan

Swiss users are once again hit with emails delivering banking malware, for both Windows and macOS systems. Trend Micro researchers believe the campaign to have been mounted by …

Don't miss

Cybersecurity news