
CipherCloud unveils first GDPR-ready cloud security solution
CipherCloud announced the availability of a cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR). Their Cloud …

Bug bounty report card: Industry diversification and growth
With a global rise in cyberattacks and a critical deficit of security talent to combat adversaries, bug bounty programs congruently grew in both volume and scope in the last …

Perception of cloud security within enterprises is improving
The perception of cloud security within enterprises is improving dramatically year-over year as cloud applications mature, according to Bitglass. One of the most significant …

A third of organizations experienced a data breach in the past 12 months
Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …

Digital businesses will suffer for inability to manage risk
As organizations transition to digital business, a lack of directly owned infrastructure and services outside of IT’s control will need to be addressed by cybersecurity. …

Photos: Infosecurity Europe 2016
Taking place in London right now is Infosecurity Europe 2016. Europe’s largest information security event has more companies exhibiting than ever before, and a …

University pays $20,000 in ransomware attack
The ransomware plague has hit the University of Calgary, and the academic institution did what many victims do: they paid the ransom to get the encrypted files back. The …

Fake gaming torrents download unwanted apps instead of popular games
If you’re looking for torrents to download pirated copies of popular games, be extra careful not to be tricked into downloading malicious and unwanted software instead. …

US-bound travelers looking for a visa might get a RAT instead
F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …

Stolen LinkedIn data used in malware campaign hitting European users
European LinkedIn users are being targeted with highly personalized malicious emails. It is more than likely that the attackers are misusing the compromised LinkedIn user data …

It takes 248 days for IT businesses to fix their software vulnerabilities
Compiled using data collected from tens of thousands of websites, a new WhiteHat Security report reveals that the majority of web applications exhibit, on average, two or more …

Retail, gaming industries hardest hit with web application and DDoS attacks
Akamai published the Q1 2016 State of the Internet – Security Report, which provides a detailed view of the global cloud security threat landscape and in-depth analysis …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)