Please turn on your JavaScript for this page to function normally.
Microsoft Exchange
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware

Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …

industry
ICS vulnerabilities disclosed in H1 2021 rose by 41%

Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyberattacks on critical infrastructure and industrial enterprises have …

attacks
Attackers rapidly adopting new techniques to target users

Zix announced the release of a report which finds attackers are rapidly adopting new techniques to target users. “Cybercrime is exploding in 2021 and if there is anything that …

ransomware
Device complexity leaving schools at heightened risk of ransomware attacks

Absolute Software announced a research revealing the significant management and security challenges faced by K-12 education IT teams with the rise in digital learning and …

Phishing
Phishing attacks increase in H1 2021, sharp jump in crypto attacks

Overall, the first half of 2021 shows a 22 percent increase in the volume of phishing attacks over the same time period last year, PhishLabs reveals. Notably, however, …

vault
Enterprises looking to cybersecurity providers to help protect IT systems

As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …

critical infrastructure
Collaboration is the key to protecting critical national infrastructure

Concern around protecting critical national infrastructure (CNI) is growing. Following several high-profile attacks and growing tensions around state sponsored cyber activity, …

ransomware
Most organizations experienced at least one ransomware attack, multiple attacks very common

One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …

zero
Even the US president wants zero trust: Here’s how to make it a reality

President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …

error
Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …

hospital
Hospitals still not protected from dangerous vulnerabilities

Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery …

ransomware
Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple …

Don't miss

Cybersecurity news