Please turn on your JavaScript for this page to function normally.
wireless router
New SOHO router malware aims for cloud accounts, internal company resources

Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, …

cloud
Top public cloud security concerns for the media and entertainment industry

Media and entertainment (M&E) companies are rapidly turning to cloud storage in efforts to upgrade their security measures, according Wasabi. Survey findings highlighted …

phishing
Threat actors exploit new channels for advanced phishing attacks

Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of …

cloud
50% of organizations exceed their budgeted spend on cloud storage

Enterprises are going all-in on cloud storage, with average stored capacity in the public cloud expected to reach 43% of their total storage footprint by 2024, and the vast …

Fire
Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. …

danger
Google Drive starts warning users about suspicious files

Google has announced on Thursday that it has started warning users when they open potentially suspicious or dangerous files hosted on Google Drive. “We will display a …

Sophie Stalla-Bourdillon2
Is cloud the solution to optimized data privacy?

In this interview with Help Net Security, Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer at Immuta, talks about data privacy, what organizations can a …

cloud storage
What are the barriers to moving legacy data to the cloud?

While 95% of tech leaders worldwide say moving their legacy application data to the cloud is a priority, and 80.5% want to do it within the next 12 months, only 35% of tech …

ransomware
Five game-changing factors for companies dealing with ransomware attacks

Continual innovation and growing sophistication of cloud services is giving organizations clear and practical routes to deal with ransomware attacks. The latest cloud-based …

work from home
WFH is here to stay: Five tactics to improve security for remote teams

When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …

vault
Image encryption technique could keep photos safe on popular cloud photo services

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …

CVS Health
Unprotected CVS database exposed sensitive customer searches

Researchers have discovered an unprotected, exposed online database with over a billion records belonging to American healthcare company CVS Health. The discovery, made by …

Don't miss

Cybersecurity news