Please turn on your JavaScript for this page to function normally.
industry
Industrial cybersecurity leaders are making considerable headway

Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. A zero trust security architecture is the …

Fraud losses
Online payment fraud losses to exceed $343 billion

Cumulative merchant losses to online payment fraud globally between 2023 and 2027 will exceed $343 billion, according to Juniper Research. As a comparison, this equates to …

week in review
Week in review: Kali Linux gets on Linode, facial recognition defeated, Log4j exploitation

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Dealing with threats and preventing sensitive data loss Recently, Normalyze, …

Log4j
How to address the ongoing risk of Log4j exploitation and prepare for the future

“Vulnerable instances of Log4j will remain in systems for many years to come, perhaps a decade or longer,” the Cyber Safety Review Board (CSRB) has concluded. …

New infosec products of the week: July 15, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Deloitte, Flashpoint, CertiK, CyberArk, and N-able. Flashpoint Automate accelerates …

encryption
Q-Day: The problem with legacy public key encryption

In the power circles where policy and technology meet, there always seems to be someone with his or her “hair on fire” about some issue or another, and it can be difficult to …

lock
Outsourcing security is the only solution for many smaller teams

Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to …

phishing kits
PayPal-themed phishing kit allows complete identity theft

Sometimes phishers are just after your username and password, but other times they are after every scrap of sensitive information they can extract from you. To do that, they …

data
The future of SOCs: Automation where it matters

Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. …

endpoint protection
Businesses are adding more endpoints, but can’t manage them all

Most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside …

network
Conventional cybersecurity approaches are falling short

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …

Office 365
Phishers steal Office 365 users’ session cookies to bypass MFA, commit payment fraud

A massive phishing campaign has been targeting Office 365 (i.e., Microsoft 365) users in over 10,000 organizations since September 2021 and successfully bypassing multi-factor …

Don't miss

Cybersecurity news