Please turn on your JavaScript for this page to function normally.
vault
Trust in fintech security has been wavering

In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and …

week in review
Week in review: The future of Metasploit, detecting lateral movement, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Beware of password-cracking software for PLCs and HMIs! A threat actor is …

identity theft
USA’s plan to build its cyber workforce, improve skills-based pathways to cyber jobs

On July 19, 2022, National Cyber Director Chris Inglis hosted the National Cyber Workforce and Education Summit at the White House. The event focused on building the cyber …

Keyboard
Lack of staff and resources drives smaller teams to outsource security

Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …

IoT
How kitemarks are kicking off IoT regulation

Regulation of the Internet of Things (IoT) has always been a contentious subject. Those against claim it stymies growth of a nascent industry, while those advocating for it …

fraud detection
How to identify and combat online fraud

As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …

Detectree
Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue

Many companies struggle to understand malicious activity and its effects while a security incident is in progress. It eats up time and resources that defenders need to contain …

mobile apps
Visibility into runtime threats against mobile apps and APIs still lacking

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

passwordless
Companies around the globe still not implementing MFA

SMB owners across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business …

Apple
CloudMensis backdoor spies on users of compromised Macs

ESET researchers discovered CloudMensis, a macOS backdoor that spies on users of compromised Macs and uses public cloud storage services to communicate back and forth with its …

tunnel
How organizations can implement a complete data strategy

In this Help Net Security video, Bernard Brantley, CISO at Corelight, discusses why organizations need to rethink their data strategy, challenging the assumption that they …

password
The importance of secure passwords can’t be emphasized enough

Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the …

Don't miss

Cybersecurity news