Please turn on your JavaScript for this page to function normally.
gap
Several high risk 0-day vulnerabilities affecting SAP HANA found

Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …

truck
Will the IoT force truck stops?

“Not with a bang, but with a whimper,” that was how T.S. Eliot described how the world would end, in his 1925 poem “The Hollow Men.” Things don’t always end in …

Biohazard
Top five most wanted malware families worldwide

The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …

industry
Most security pros expect increasing attacks on Industrial Internet of Things

A new Dimensional Research survey looked at the rise of Industrial Internet of Things (IIoT) deployment in organizations, and to what extent it is expected to cause security …

Microsoft
By the end of March no one will remember that Microsoft missed a Patch Tuesday

Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …

gears
Secure operations automation: Close the gap between security and operations teams

A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …

stats
Total security appliance market shows positive growth

The total security appliance market showed positive growth in both vendor revenue and unit shipments for the fourth quarter of 2016, according to IDC. Worldwide vendor …

Week in review: Apache servers under attack, machine leaning in infosec

Here’s an overview of some of last week’s most interesting news, podcasts and articles: The six stages of a cyber attack lifecycle High-impact cyber incidents can …

idea
How to patch your security blind spots

One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing …

quantum
The security threat of quantum computing is real, and it’s coming fast

The threat quantum computers pose on encryption is weighing on the minds of some of the world’s most technologically advanced nations: In 2016 alone, the EU announced a $1.13B …

secure
What’s the security posture of the Fortune 1000?

BitSight analyzed the security posture of some of the world’s largest organizations, and identified the most common system compromises. For comparison, Fortune 1000 companies …

open lock
21% of websites still use insecure SHA-1 certificates

New research from Venafi Labs shows that 21 percent of the world’s websites are still using certificates signed with the vulnerable Secure Hash Algorithm, SHA-1. On February …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools