Please turn on your JavaScript for this page to function normally.
Phishing
Phishing trends: Who is targeted and why

The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …

Search
Monitoring scanning activities that could lead to IoT compromises

IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

firefighters
Number of disclosed vulnerabilities reaches all time high in 2016

A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …

certificate
Scale, frequency and causes of certificate-related outages

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …

building
Identity fraud hits record high

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. …

users
AppSec teams facing resourcing issues that are making them vulnerable

A new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within …

money
CSOs reveal true cost of breaches

Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …

SSD
SSD security challenges: Which data sanitization methods are effective?

In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. Organizations face a myriad of internal and …

world biohazard
The emergence of new global cybercriminal attack patterns

The findings of a new Malwarebytes report illustrate a significant shift in cybercriminal attack and malware methodology from previous years. Ransomware, ad fraud and botnets, …

labyrinth
Irregular application testing: App security in healthcare

Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

brain
Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year. As a result, the …

fire
Increasingly sophisticated attacks call for advanced protection tools

A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …

Don't miss

Cybersecurity news