Please turn on your JavaScript for this page to function normally.
malware
Researchers outline the Lazarus APT offensive toolset

ESET researchers uncovered and analyzed a set of malicious tools that were used by the Lazarus APT group in attacks during the end of 2021. The campaign started with spear …

malware
Detecting fileless malware infections is becoming easier

For some analysts, memory analysis is only an optional step in cybersecurity investigations. Their reasons are simple. One: Handling memory and volatile data is a complex …

DevSecOps
The impact of DevSecOps practices on software development

A trending practice for application security, DevSecOps includes integrating security early in the software development life cycle (SDLC) and enables the delivery of reliable …

numbers
Why organizations take data sovereignty seriously

According to a Vanson Bourne survey, the vast majority of organizations across France, Germany, the UK, and the US either have sovereignty regulations or policies to keep …

Microsoft 365
Many IT pros don’t think a ransomware attack can impact Microsoft 365 data

Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months, according to Hornetsecurity. The 2022 Ransomware Report, which …

week in review
Week in review: MS Exchange zero-days exploited, AD attack paths, developing secure APIs

SpyCast: Cross-platform mDNS enumeration tool SpyCast is a cross-platform mDNS enumeration tool that can work either in active mode by recursively querying services or in …

cloud
The current state of cloud security

Cloud security became much more complicated as COVID-19 hit and remote/hybrid workforces emerged. Organizations are struggling to sufficiently secure new cloud environments …

binary
The significance of parallel tasks execution for security teams

Infosec teams require nimble security tools to operate in realistic conditions, which may involve thousands of simultaneous events. In this Help Net Security video, Leonid …

gap
Top issues driving cybersecurity: Growing number of cybercriminals, variety of attacks

Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the …

identity theft
Are you inundated by a never-ending stream of cyberattacks?

Trellix released global research revealing the cost of siloed security, weak spots in protection, and lack of confidence amongst security operations teams. The study of 9,000 …

Phishing
Phishing activity exploded in Q2 2022

The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for phishing that …

IoT
Embedded IoT security threats and challenges

IoT embedded systems combine hardware, firmware, and internet connectivity to carry out particular functions. These devices transfer real-time data via the internet for …

Don't miss

Cybersecurity news