Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Cyber attacks on Ukraine, Help Net Security: Healthcare Cybersecurity Report is out

Here’s an overview of some of last week’s most interesting news, articles and interviews: Help Net Security: Healthcare Cybersecurity Report has been released Our newest …

Fire
Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. …

Cybercriminals seeking more than just ransomware payment

Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that …

endpoint protection
Devastating breaches apparently still not enough for organizations to prioritize endpoint security

Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …

ransomware
Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …

ecommerce
The impact of API security on how consumers view brands

ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or …

hardware security
Hardware security modules market to reach $7.9 billion by 2028

The global hardware security modules market size was valued at $3.1 billion in 2020 and is projected to reach $7.9 billion by 2028, growing at a CAGR of 12.4% from 2021 to …

Log4j
How Log4Shell remediation interfered with organizations’ cybersecurity readiness

(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …

data
How to keep pace with rising data protection demands

The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …

Magnify
Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered

Sophos released a research that details code similarities in the general purpose Dridex botnet and the little-known ransomware, Entropy. The similarities are in the software …

ransomware
Ransomware wreaked havoc last year, manufacturing was most targeted

IBM Security released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 …

eavesdropping
How mobile app usage data could reveal a person’s identity

The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the …

Don't miss

Cybersecurity news