100,000 web shops open to compromise as attackers exploit Magento bug
A critical vulnerability found in Magento, the most popular content management system for e-commerce sites, is being exploited by hackers to get their hands on users’ …
DDoS threat recognized by all members of the C-suite
The increasing number and size of DDoS attacks and their costly and devastating effects on brand perception have not passed unnoticed by North American businesses, most of …
CyberCenturion contest seeks out UK’s young cyber security talent
Northrop Grumman Corporation has renewed its commitment to run the successful CyberCenturion competition for a second year in 2016, continuing its efforts to seek out the …

High-profile data breaches made most CEOs re-examine security programs
There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP …
Latest trends in the ransomware business
“Cybercrooks wielding ransomware might prefer getting paid in Bitcoin, but the crypto currency is just a way to obfuscate the real destination of the payment – as …

Photos: RSA Conference 2015, part 5
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: Bleuliv, Entrust Datacard, Palo Alto Networks, Bitglass, Duo …

IBM brings cyber threat analytics to the cloud
IBM announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real …

Cyphort combines APT detection with lateral movement
At RSA Conference 2015, Cyphort announced the availability of Cyphort Advanced Threat Defense Platform 3.3, which includes malware lateral movement detection, the ability to …
WordPress issues critical security release
WordPress users should update as soon as possible, as the latest release (4.1.2) plugs a critical cross-site scripting vulnerability that could allow anonymous users to …

Network discovery and visibility for massive enterprise networks
At RSA Conference 2015, Auconet unveiled its new Enterprise Security Foundation (ESF) that fortifies security for both partners and enterprises. ESF provides third-party …

Adding context to security data to achieve visibility into attacks
At RSA Conference 2015, RSA announced new capabilities have been added to its Security Analytics solution, which is engineered to give organizations the necessary context to …

Photos: RSA Conference 2015, part 4
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2015.Featured firms: BalaBit, Tenable Security, Qualys, Websense, Titus, Splunk, Cybereason.
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption