Please turn on your JavaScript for this page to function normally.
cyber attacks
Too many ICS assets are exposed to the public internet

The enterprise attack surface is expanding in multiple ways, becoming more numerous and more specific, according to runZero. “Our research reveals alarming gaps and unexpected …

Infosec products of the week
New infosec products of the week: May 17, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Calix, FireMon, ManageEngine, and OWASP Foundation. Calix strengthens SmartBiz …

open source
Is an open-source AI vulnerability next?

AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for those of us in …

botnet
Ebury botnet compromises 400,000+ Linux servers

ESET researchers released its deep-dive investigation into one of the most advanced server-side malware campaigns. It is still growing and has seen hundreds of thousands of …

SurfShark CleanWeb
Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb

A study by PageFair revealed that ad blocker usage surged by 30% in 2016 alone, reflecting a growing public concern for privacy and uninterrupted browsing. Fast-forward to …

cloud
Cloud security incidents make organizations turn to AI-powered prevention

Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a significant increase from 24% the year …

leaders
The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right …

ransomware
Ransomware statistics that reveal alarming rate of cyber extortion

In this article, you will find excerpts from various reports that offer statistics and insights about the current ransomware landscape. Global ransomware crisis worsens NTT …

lock
Key questions to ask when tailoring defensive stacks

In this Help Net Security video, Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, outlines the questions you need to ask your security team when tailoring a …

Vulnerability
Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable amount of risk, according to …

CISSP exam experience
How a GRC consultant passed the CISSP exam in six weeks

Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility, or difficulty, and almost invariably they …

Are you meeting your cyber insurance requirements?

Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity …

Don't miss

Cybersecurity news