In the age of disruption, comprehensive network visibility is key
IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …
MongoDB is subject to continual attacks when exposed to the internet
On average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database …
Better cybersecurity hinges on understanding actual risks and addressing the right problems
SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …
New technique keeps your online photos safe from facial recognition algorithms
In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …
Ransomware attacks are increasing, do you have an emergency plan in place?
39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …
Duration of application DDoS attacks increasing, some go on for days
There were seven major application DDoS attacks over the previous month — two of which lasted 5-6 days, Imperva reveals. Additionally, the team found that 47% of account …
Most malware in Q1 2020 was delivered via encrypted HTTPS connections
67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and 72% of encrypted malware was classified as zero day, so would have evaded signature-based …
83% of Global 2000 enterprises have not adopted basic domain security practices
There are significant shortfalls in enterprise domain security practices, putting organizations’ internet-facing digital assets at risk to threats, including domain name and …
Can we safeguard the election infrastructure from cyber attacks?
70 percent of security professionals believe their local governments cannot adequately safeguard the election infrastructure against domestic and international cyber attacks. …
Complexity and size of DDoS attacks have increased
The complexity and size of DDoS attacks in 2019 has increased significantly compared to 2018. A report published by NaWas by NBIP concludes that despite the number of attacks …
The impact of SD-WAN for securing public cloud adoption
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats …
What is the true extent of the modern corporate digital attack surface?
RiskIQ released a report analyzing the company’s internet-wide telemetry and massive internet data collection to reveal the true extent of the modern corporate digital …
Featured news
Resources
Don't miss
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?