Please turn on your JavaScript for this page to function normally.
Bluetooth
The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Where is the issue? The problem lies in …

abstract
Managed detection and response: Separating the players from the pretenders

Emerging from the traditional managed security service provider (MSSP) model, Managed Detection and Response (MDR) is an answer to the fact that threat actors have increased …

network
Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

There are notable network performance and connectivity differences between the five major public cloud providers – Amazon Web Services (AWS), Google Cloud Platform (GCP), …

HTTPS
Trusted certificates make phishing websites appear valid

There has been a rampant growth of look-alike domains, which are often used to steal sensitive data from online shoppers. Venafi analyzed suspicious domains targeting 20 major …

healthcare
Healthcare spikes data breach fever, endpoint threat detections grow 60%

The healthcare industry has been overwhelmingly targeted by Trojan malware during the last year, which increased by 82 percent in Q3 2019 over the previous quarter, according …

password
Do your infosec habits make you vulnerable to fraud?

A third of Americans have been a victim of information fraud or identity theft. Despite notable data breaches in 2019, when asked if they update or change passwords/PINs after …

users
Week in review: How to avoid lateral phishing, what’s the right time to red team?

Here’s an overview of some of last week’s most interesting news and articles: Your supplier’s BEC problem is your BEC problem BEC scammers don’t care what business …

bomb
Attack tools and techniques used by major ransomware families

Ransomware tries to slip unnoticed past security controls by abusing trusted and legitimate processes, and then harnesses internal systems to encrypt the maximum number of …

risk
To improve incident response, you need to consider 3rd party solutions

Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Improve incident …

cloud
IT professionals deem hybrid cloud as most secure

Enterprises plan to aggressively shift investment to hybrid cloud architectures, with respondents reporting steady and substantial hybrid deployment plans over the next five …

gift
Evaluating cyber risk during the holiday season

Fears of data loss, identity theft and fraud are leaving American consumers on edge this holiday season, and they’re prepared to hold their financial institution responsible …

IoT
Disruptive technology predictions: 2020 will see the creation of completely connected environments

Mainstream adoption of disruptive technologies in 2020 will finally see data, automation and IoT technologies come together to create connected cities and societies, NTT …

Don't miss

Cybersecurity news