Please turn on your JavaScript for this page to function normally.
healthcare
How organizations view and manage cyber risk

Amid a wider range of issues to handle, a majority of board members and senior executives responsible for their organization’s cyber risk management had less than a day in the …

building
Businesses need to treat cybersecurity as something that crosses organizational boundaries

Companies are working to balance their desire for new innovations with their need for strong cyber-defenses, according to a new report from CompTIA. CompTIA’s …

fire
Threat visibility is imperative, but it’s even more essential to act

Cyberthreats are escalating faster than many organizations can identify, block and mitigate them. Visibility into the expanding threat landscape is imperative, but according …

danger
Fileless attacks designed to disguise malicious activity up 265%

Trend Micro published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat …

drown
SOCs still overwhelmed by alert overload, struggle with false-positives

Security Operations Center (SOC) analysts continue to face an overwhelming number of alerts each day that are taking longer to investigate, leading five times as many SOC …

money
Cost of data breaches to surpass $5 trillion in 2024

A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This …

dislike
Attackers use large-scale bots to launch attacks on social media platforms

Social media sites have become lucrative targets for criminals looking for quick monetization. More than half of logins (53%) on social media sites are fraudulent and 25% of …

shark
Five vendors accounted for 24.1% of vulnerabilities in 2019 so far

Risk Based Security reported today that VulnDB aggregated 11,092 vulnerabilities with disclosure dates during the first half of 2019, with CVE/NVD falling behind by 4,332 …

skull
Facebook phishing surges, Microsoft still most impersonated brand

Vade Secure published the results of its Phishers’ Favorites report for Q2 2019. According to the report, which ranks the 25 most impersonated brands in phishing attacks, …

2019 Cloud Security Report
2019 Cloud Security Report: Latest trends and challenges

Check out the 2019 Cloud Security Report sponsored by (ISC)². Based on a comprehensive survey of cybersecurity professionals in the 400,000+ cybersecurity community on …

bomb
Threat actors are adapting and switching their operations strategically and technically

Cybercrime campaigns and high-profile advanced persistent threat groups are shifting how they target victims and focusing more on intricate relationships with “secure …

DDoS
The changing face of DDoS attacks: Degraded performance instead of total takedown

The number of DDoS attacks might be getting higher, but they are not all massive nor do they always trigger DDoS defenses. In fact, small-scale DDoS attacks are becoming more …

Don't miss

Cybersecurity news