Can we extinguish the Mirai threat?
The recent massive DDoS attack against DNS provider Dyn has jolted (some of) the general public and legislators, and has opened their eyes to the danger of insecure IoT …
Espionage group uses cybersecurity conference invite as a lure
A cyber espionage group that has been targeting organizations in Southeast Asia for years is misusing a legitimate conference invite as a phishing lure to trigger the download …
Free download – SysAdmin Magazine: Tools & Tips for Security Admins
Every day security administrators monitor networks, support security tools, establish security requirements, perform vulnerability assessments, and much more. SysAdmin …
Most unpatched Joomla sites compromised in latest wave of attacks
If you run a Joomla-based website and you haven’t implemented the latest security release of the CMS, your site has been almost surely compromised. According to Sucuri …
What can we do about the critical cybersecurity skills shortage?
Tech-savvy youth could plug a widening skills gap as employers seek to combat the growing threat of cybercrime and avert mass disruption to public and private lives. But the …
Healthcare industry lacks basic security awareness among staff
SecurityScorecard released a comprehensive analysis exposing cybersecurity vulnerabilities across 700 healthcare organizations including medical treatment facilities, health …
52% of enterprises choose cloud as the platform of choice
Adoption reality finally measures up to hype for cloud computing. There are game-changing consequences for IT departments as DevOps’ influence extends across the enterprise, …
LogiLube to offer ironclad security based on Waterfall’s Unidirectional Security Gateway
Waterfall Security Solutions nnounced a collaboration with LogiLube to protect LogiLube’s customers’ industrial sites from online cyber attacks. By deploying Waterfall’s …
Week in review: IoT, Windows code injection, new user privacy rules for ISPs
Here’s an overview of some of last week’s most interesting news, reviews and articles: New code injection attack works on all Windows versions Researchers from …
Australian blood donors’ info found leaking from insecure server
Personal information of some 550,000 Australian blood donors has been sitting exposed on a web developer’s server and has been downloaded by a person who effectively …
New code injection attack works on all Windows versions
Researchers from security outfit enSilo have uncovered a new code injection technique that can be leveraged against all Windows versions without triggering current security …
Nearly half of consumers have been cybercrime victims
45% of consumers have been a victim of some form of cybercrime — with 65% choosing not to report the incident to authorities. Research also found that one in six of these …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)