High volume DDoS attacks still persistent
Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …
Researchers mount cyber attacks against surgery robot
A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely …
Police dismantle gang of online fraudsters and romance scammers
The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were …
Email delivery service SendGrid confirms data breach
Sendgrid, the email delivery and management service that counts among its clients companies like Pinterest, Airbnb and Uber, has admitted that they have been …
Big Data and analytics are changing the cybersecurity landscape
Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all …
Security still the top issue preventing payments investment
A new payments survey of more than 1,100 executives representing banks, retailers and billing organizations across the world revealed that although 80 percent of them …
Only 57% of critical IT infrastructure issues are detected before business impact
Organizations large and small are struggling to meet their Key Performance Indicator (KPI) goals and prevent IT issues before they adversely impact the business, according to …
A closer look at LepideAuditor for File Server
Organizations host file servers to store critical data to and valuable information about its business, customers, and employees. Access to file servers is authorized only for …
There’s now a decryption tool for TeslaCrypt ransomware
“Here’s some very good news for victims of the TeslaCrypt ransomware: Cisco researchers have created a tool for them to decrypt the files themselves and avoid …
Banking Trojan delivered to companies via macro-based malware
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …
WordPress vulnerable to yet another, still to be patched XSS flaw
The latest WordPress version (4.2, released on Thursday) and several earlier ones are vulnerable to a stored cross-site scripting (XSS) vulnerability that can be exploited to …

Successful POS attacks are the result of poor security, researchers find
Most data breaches involving payment card information – and there have been too many in the last two years – can be traced back to a lack of implementation of …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption