
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals
Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …

Enterprises are missing the warning signs of insider threats
Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT …

Enterprising criminals are selling direct access to cloud accounts
Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …

Ransomware attacks increased by 288% in H1 2021
Analysis from NCC Group’s Research Intelligence and Fusion Team (RIFT) has highlighted the growing threat of ransomware around the world. The number of ransomware attacks …

Consumers satisfied with mobile security, yet account privacy and protection concerns remain
More than half of wireless subscribers polled were extremely or somewhat satisfied with the security offered by their mobile operators, according to a mobile security survey …

Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …

The cybersecurity of industrial companies remains low, potential damage can be severe
Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …

Why companies should never hack back
After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …

Increase in credential phishing and brute force attacks causing financial and reputational damage
Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …

How enterprises use security operations to modernize their business
CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

Vulnerability management is facing three core problems: Here’s how to solve them
The COVID-19 pandemic has placed enormous stress on information security professionals. A threat landscape that was already growing more complex by the minute now presents an …

Checking for misconfigurations isn’t enough
Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests