Please turn on your JavaScript for this page to function normally.
Attackers posing as legitimate insiders still an enormous security risk

Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …

Companies leave vulnerabilities unpatched for up to 120 days

Kenna studied the proliferation of non-targeted attacks and companies’ ability to mitigate these threats through the timely remediation of security vulnerabilities in their …

Women represent only 10% of the infosec workforce

Surveying nearly 14,000 global professionals, a new (ISC)2 report focuses on the lack of gender diversity in the information security workforce despite a cyber landscape that …

File insecurity: the final data leakage frontier

The growth of cloud and mobile computing, the ease at which files can be shared and the diversity of collaboration methods, applications and devices have all contributed to …

VBA malware is back!

“VBA malware is far from dead. In fact, as Sophos researchers recently noted, approximately 50 to 100 new VBA malware samples are spotted each day. For those who …

Too many vulnerable medical systems can be found online

How many critical medical systems can be found on the Internet, accessible to and hackable by remote attackers? According to security researchers Scott Erven and Mark Collao, …

XOR DDoS botnet launching attacks from compromised Linux machines

Attackers have developed a botnet capable of 150+ Gbps DDoS attack campaigns using XOR DDoS, a Trojan malware used to hijack Linux systems, according to Akamai.What is XOR …

Do security flaws with life-threatening implications need alternative disclosure?

If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) …

How to avoid data breaches? Start by addressing human error

Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …

Chinese fraudsters are hijacking and misusing Uber accounts

Uber accounts continue to be hijacked, this time by Chinese fraudsters. According to Motherboard, a number of users complained recently on Twitter that their accounts have …

Exabeam secures $25 million in Series B funding

Exabeam closed a $25 million financing round to further accelerate the company’s growth and continue updating its user behavior analytics (UBA) solution.Icon Ventures …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Don't miss

Cybersecurity news