Please turn on your JavaScript for this page to function normally.
degree
Main cybersecurity problem for colleges? Gathering diverse kinds of data

Each time a major retailer, credit bureau or healthcare provider experiences a significant data breach, even the experts in cybersecurity circles wonder, “What could be …

skull
Dark web ransomware economy: Sellers pulling in six-figure salaries

There are currently more than 6,300 estimated dark web marketplaces selling ransomware, with more than 45,000 current product listings, according to new research by Carbon …

Network
Investigation reveals large botnet hiding behind Fast Flux technique

Fast Flux, a DNS technique first introduced in 2006 and widely associated with the Storm Worm malware variants, can be used by botnets to hide various types of malicious …

earth
Inside the Middle Eastern and North African cybercriminal underground

Trend Micro researchers investigated the Middle Eastern and North African cybercriminal underground, and found that prices for malware and hacking tools are generally a bit …

professional
Do board members treat cybersecurity as a top priority?

Despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world still believe that business …

cloud threats
Cloud IT infrastructure revenue has almost tripled in the last four years

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 25.8% year over year in the …

Hands
Week in review: Email tracking, DNS exfiltration, and secure coding in Java

Here’s an overview of some of last week’s most interesting news and articles: Leaving employees to manage their own password security is a mistake Despite the …

patch
In wake of recent attacks, it’s time to revisit your patch policy

Hurricanes hammered the United States last month and cyber attacks continue to rain down throughout the world. The EternalBlue v1SMB vulnerability continues to be a focus of …

password
Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …

brain
Most decision makers expect ROI from artificial intelligence within two years

Cylance polled 652 IT decision makers in the U.S., UK, Germany and France, and found that optimism about the value of artificial intelligence-powered solutions in the …

money
Worldwide IT spending to reach $3.7 trillion in 2018

Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 4.3 percent from 2017 estimated spending of $3.5 trillion, according to the latest forecast …

Office 365
KnockKnock campaign targets Office 365 corporate email accounts

Researchers uncovered KnockKnock, an attack on Office 365 Exchange Online email accounts, originating from 16 countries around the world and targeted organizations in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools