cybersecurity

CFOs are becoming catalysts of digital strategy
As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to …

For SOC teams, the analytics and automation hype is real
Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better …

5 cybersecurity trends MSPs must address in 2021
2020 was chock full of surprises and twists that no analyst could have predicted and came with a massive shift to remote working and tools that facilitate it. The good news is …

Successful BEC attacks become 56% more costly
The number of phishing attacks grew through 2020, fully doubling over the course of the year. Attacks peaked in October 2020, with a high of 225,304 new phishing sites …

mHealth apps consistently expose PII and PHI through APIs
All of the 30 popular mHealth apps that were tested are vulnerable to API attacks that can allow unauthorized access to full patient records including protected health …

2020 vulnerability disclosures on track to exceed those from 2019
2020 vulnerability disclosures are on track to exceed 2019 despite a sharp decrease of 19.2% observed earlier in the year, according to Risk Based Security. The team …

Researchers spot massive increase in RDP attack attempts
The COVID-19 pandemic continued to influence the cybercrime landscape in 2020, ESET reveals. Most notably, the new attack surface created by the shift to work from home …

Big Tech will try to pre-empt harsh privacy laws by writing their own
Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, …

Protecting productivity within the disappearing perimeter
During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in …

Credential spill incidents nearly doubled since 2016
The number of annual credential spill incidents nearly doubled from 2016 to 2020, according to F5 research. There was a 46% downturn in the number of spilled credentials …

People are often the collateral damage of attacks on corporations
Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from …

IPCDump: Open-source tool for tracing interprocess communication on Linux
Guardicore released IPCDump, a new open source tool for tracing interprocess communication on Linux. The tool covers most interprocess communication (IPC) mechanisms, …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards