Please turn on your JavaScript for this page to function normally.
Hand
Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …

BEC scams
Language-based BEC attacks rising

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …

Car
Autonomous vehicles can be tricked into erratic driving behavior

When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have …

Scams account for most of all financially motivated cybercrime

The scam industry is becoming more structured and involves more and more parties divided into hierarchical groups, according to Group-IB. The number of such groups jumped to a …

SASE
Paving your path to SASE: 4 tips for achieving connectivity and security

Today, optimized network connectivity and security are both first-class citizens; IT teams can no longer sacrifice one for the other. As the number of distributed workers …

hand
How cybercriminals are targeting executives at home and their families

Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass …

DDoS
DDoS threats growing in sophistication, size, and frequency

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …

Pay
Contactless is reigning: Consumers can’t even remember their PIN

Marqeta has released its 2022 State of Consumer Money Movement report looking at consumer payment, banking and shopping preferences, showing digital adoption is on the rise. …

vault
Future proofing: How companies can upgrade cyber defenses and be ready for tomorrow

Today’s threat landscape is constantly evolving. Threat actors and tactics are becoming more determined and advanced. In this video for Help Net Security, Jaspal Sawhney, …

zero
Zero-trust-washing: Why zero trust architecture is the framework to follow

Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a …

criminal
57% of all digital crimes in 2021 were scams

Group-IB shares its analysis of the landscape of the most widespread cyber threat in the world: scams. Accounting for 57% of all financially motivated cybercrime, the scam …

handshake
How effective are public-private partnerships?

Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to …

Don't miss

Cybersecurity news