Please turn on your JavaScript for this page to function normally.
Connected homes are expanding, so is attack volume

78% Americans report unsafe online behaviors that open them up to cyber threats, such as reusing or sharing passwords, skipping software updates and more – a 14% increase from …

face
UID smuggling: A new technique for tracking users online

Advertisers and web trackers have been able to aggregate users’ information across all of the websites they visit for decades, primarily by placing third-party cookies in …

open source
Open source vulnerabilities add to security debt

The number of open source vulnerabilities that Mend identified and added to its vulnerability database in the first nine months of 2022 was 33 percent greater than the first …

binary
85% of attacks now use encrypted channels

Malware continues to pose the greatest threat to individuals and businesses across nine key industries, with manufacturing, education and healthcare being the most commonly …

vectors
5 cybersecurity trends accelerating in 2023

Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that you need to be aware of: The business of …

week in review
Week in review: Citrix and Fortinet RCEs, Microsoft fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability with public PoC affects Cisco IP phones, fix unavailable …

New infosec products of the week: December 16, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Box, Ermetic, Keysight Technologies, Searchlight Security, and WatchGuard. …

risk
Executives take more cybersecurity risks than office workers

Ivanti worked with cybersecurity experts and surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand the perception of today’s …

IronCore Labs
Product showcase: Searchable encryption in Elasticsearch and OpenSearch with IronCore Labs

When it comes to sensitive data, search services are the ultimate treasure trove for hackers. Why slowly sift through information when a search service has indexed it all for …

sad
Distractions at work can have serious cybersecurity implications

Distracted employees are twice as likely to do the bare minimum for security at work, according to 1Password. The findings reveal that sustained burnout, now paired with high …

payments
As legislation evolves, businesses need a firm understanding of secure payment options

Despite the constant evolution of the financial landscape, consumers are still prioritizing a seamless and safe payment journey above all else, according to PCI Pal. New …

open source security
OSV-Scanner: A free vulnerability scanner for open-source software

After releasing the Open Source Vulnerabilities database (OSV.dev) in February, Google has launched the OSV-Scanner, a free command line vulnerability scanner that open source …

Don't miss

Cybersecurity news