cybersecurity

Risky transactions on mobile devices increase 138% since 2017
Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United …

Keeping up with the evolving ransomware security landscape
Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware …

Security services and network security still top spending priorities for CISOs in MENA
Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

Container usage has grown in complexity, specific security controls are needed
Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

Cybercriminals using custom phishing tools to target the world’s largest tech brands
Cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, …

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals
Though cybercriminals have been targeting the gaming community since 2010, eSports players, gaming companies, sponsors and viewers will be more at risk over the coming years …

Want to overcome patching challenges once and for all? Automation is the key
The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …

Majority of 2019 breaches were the result of unapplied security patches
Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data …

Examining security process maturity in 400 organizations
There’s an overall failure in maturity of security processes of over 400 organizations in industries ranging from e-commerce, retail and payment processor to …

Is the enterprise on the brink of a global web supply chain attack?
Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

Exploring the benefits of cybersecurity certification
In this interview, Tony Vizza, Director of Cybersecurity Advocacy APAC, (ISC)2, talks about the benefits of earning a cybersecurity certification, the most common …

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance
There is a growing impact of large-scale data breaches and fraud on consumer trust and the critical need for businesses to balance the digital consumer experience with strong …
Featured news
Resources
Don't miss
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care