Please turn on your JavaScript for this page to function normally.
The unstoppable rise of DDoS attacks

For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …

How to sabotage DDoS-for-hire services?

We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them.What is less known is that a simple move like making PayPal seize the …

Five points of failure in recovering from an attack

An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection …

Privileged accounts are still easy to compromise

A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …

Impact and scope of fraud that crosses multiple industries

84 percent of fraud mitigation professionals interviewed by LexisNexis Risk Solutions see fraud that crosses multiple industries in their investigations.Multi-industry fraud …

Looks like mobile device security is on nobody’s mind

Despite recent high-profile data theft attacks, much of the American workforce has not taken action to protect information on their personal and corporate-issued devices. …

API security becoming a CXO level concern

Today at Black Hat USA 2015, Akana released the findings of a survey of over 250 security practitioners, including CSOs, CISOs, and security architects.Aimed at quantifying …

79% of companies release apps with known vulnerabilities

The application development process is rampant with security risks due to current business pressures, according to new research released at Black Hat USA 2015 by Prevoty. From …

The leading cause of insider threats? Employee negligence

Employee negligence, which may be caused by multitasking and working long hours, can result in insider threats and cost companies millions of dollars each year. It can cost a …

The rapid growth of the bug bounty economy

On average, nearly five high-to-critical priority vulnerabilities are found within the lifetime of a single program, according to Bugcrowd.Another observed trend includes the …

Cyber insurance market to hit US$10 billion by 2020

Continued and sustained cyberattacks are having a ruinous effect on enterprises and driving up the cost of incident response. With over 900 million reported records exposed in …

Cybercriminals are preying on existing vulnerabilities to plan future attacks

Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …

Don't miss

Cybersecurity news