Please turn on your JavaScript for this page to function normally.
zero trust
The factors driving today’s accelerated zero trust adoption

Zero trust has quickly progressed from a buzzword to a critical business imperative, Okta’s 2022 State of Zero Trust Security Report has found. Today, 97% of businesses say …

identity theft
Identity crimes reach all-time high

The Identity Theft Resource Center (ITRC) has published a report that looks at the identity crimes committed against individuals as reported by the victims of those crimes. In …

DevSecOps
What is challenging successful DevSecOps adoption?

Mezmo published an ESG report which provides insights on DevSecOps adoption, its benefits, and the challenges with implementation. According to the study, only 22% of …

email
Response-based attacks make up 41% of all email-based scams

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, …

healthcare
Ransomware is back, healthcare sector most targeted

In Q2 2022, Kroll observed a 90% increase in the number of healthcare organizations targeted in comparison with Q1 2022, dropping the final nail in the coffin for the “truce” …

security awareness
25% of employees don’t care enough about cybersecurity to report a security incident

According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. This Help Net Security video …

ransomware
Ransomware is not going anywhere: Attacks are up 24%

Avast released a report revealing a significant increase in global ransomware attacks, up 24% from Q1/2022. Researchers also uncovered a new zero-day exploit in Chrome, as …

fix
The impact of exploitable misconfigurations on network security

Network professionals feel confident with their security and compliance practices but data suggests that they also leave their organizations open to risk, which is costing a …

email
Which malware delivery techniques are currently favored by attackers?

A wave of cybercriminals spreading malware families – including QakBot, IceID, Emotet, and RedLine Stealer – are shifting to shortcut (LNK) files for email malware delivery. …

Black Hat
What Black Hat USA 2022 attendees are concerned about

Black Hat released its Supply Chain and Cloud Security Risks Are Top of Mind survey. The report highlights important findings from more than 180 of experienced cybersecurity …

Kubernetes
Organizations grew to love Kubernetes: Usage in production is high

Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they …

email
Universities are at risk of email-based impersonation attacks

Proofpoint released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, …

Don't miss

Cybersecurity news