Please turn on your JavaScript for this page to function normally.
account
Online fraud skyrocketing: Gaming, streaming, social media, travel and ecommerce hit the most

An Arkose Labs report is warning UK commerce that it faces its most challenging year ever. Experts analyzed over 150 billion transaction requests across 254 countries and …

AI
AI can spot biometric spoofing attacks with ease

Humans have far greater difficulty identifying images of biometric spoofing attacks compared to computers performing the same task, according to research released by ID …

cybersecurity investments
Why the C-suite should focus on understanding cybersecurity and investing appropriately

Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% …

Ransomware attacks, and ransom payments, are rampant among critical infrastructure organizations

80% of critical infrastructure organizations experienced a ransomware attack in the last year, with an equal number reporting that their security budgets have risen since …

Linux
How cybercriminals are using malware to target Linux-based operating systems

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …

healthcare
Attacks against health plans up nearly 35%

Critical Insight announced the release of a report which analyzes ​​breach data reported to the U.S. Department of Health and Human Services by healthcare organizations. As we …

Group-IB Threat Intelligence & Attribution (TI&A)
Review: Group-IB Threat Intelligence & Attribution (TI&A)

Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

identify
Reducing the blast radius of credential theft

Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data …

cybersecurity jobs
Cybersecurity staff turnover and burnout: How worried should organizations be?

The heightened risk of cyberattacks on businesses is being compounded by significant recruitment and retention issues within cybersecurity teams, making businesses more …

hole
How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …

face
Number of data compromises reaching all-time high

According to an Identity Theft Resource Center (ITRC) report, the overall number of data compromises (1,862) is up more than 68 percent compared to 2020. The new record number …

ransomware
Ransomware families becoming more sophisticated with newer attack methods

Ivanti, Cyber Security Works and Cyware announced a report which identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26% increase over …

Don't miss

Cybersecurity news