
Malware-related attacks jump by 54%
Extensive analysis of cyberthreats in 2020 reveals a 91% jump in attacks on industrial companies and a 54% rise in malware-related attacks compared to 2019. Medical …

Threat intelligence: The biggest blind spot for CISOs
More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey also found …

The most important point in a cyberattack is before it happens
Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so …

Endpoint complexities leaving sensitive data at risk
Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

The human cost of understaffed SOCs
SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

SeKVM: Securing virtual machines in the cloud
Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, …

New TSA security directive is a needed shock to the system
The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect …

How businesses can protect their brands and bottom lines against damage from illegal robocalls
March 17, 2021 was a milestone in the war on illegal robocalls. The FCC levied a $225 million fine — the largest in its history — on a telemarketer for making 1 billion …

Identity crime victims struggling with financial, emotional and physical impacts
Nearly 30 percent of people who contact the Identity Theft Resource Center (ITRC) are victims of more than one identity crime. Their latest study covers the 36 months from …

The state of enterprise preparedness for ransomware attacks
In the aftermath of the Colonial Pipeline attack, ISACA polled more than 1,200 members in the United States and found that 84 percent of respondents believe ransomware attacks …

Enterprise networks vulnerable to 20-year-old exploits
Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. While exotic attacks and nation-states such as Russia and …

Cybersecurity leaders lacking basic cyber hygiene
Constella Intelligence released the results of a survey that unlocks the behaviors and tendencies that characterize how vigilant organizations’ leaders are when it comes to …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility