Please turn on your JavaScript for this page to function normally.
industry
There is no secure critical infrastructure without identity-based access

Organizational security strategy has long been defined by an internal perimeter enclosing all a company’s information in a single secure location. Designed to keep external …

free cybersecurity courses
7 free online cybersecurity courses you can take right now

The cybersecurity skills shortage continues to present multiple challenges and have repercussions for organizations. The skills gap can be addressed through training and …

eBook: 4 cybersecurity trends to watch in 2022
eBook: 4 cybersecurity trends to watch in 2022

With the rapid acceleration of cloud usage and digitized systems, a host of new security concerns are likely to emerge in the new year. Growing threats around network defense, …

Go-Ahead
Go-Ahead cyberattack might derail UK public transport services

One of the UK’s largest public transport operators, Go-Ahead Group, has fallen victim to a cyberattack. The Go-Ahead Group, which connects people across its bus and rail …

QNAP
DeadBolt is hitting QNAP NAS devices via zero-day bug, what to do?

A few days ago – and smack in the middle of the weekend preceding Labor Day (as celebrated in the U.S.) – Taiwan-based QNAP Systems has warned about the latest …

files
What’s polluting your data lake?

A data lake is a large system of files and unstructured data collected from many, untrusted sources, stored and dispensed for business services, and is susceptible to malware …

phishing
EvilProxy phishing-as-a-service with MFA bypass emerged on the dark web

Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns …

online shopping
62% of consumers see fraud as an inevitable risk of online shopping

59% of consumers are more concerned about becoming a victim of fraud now than they were in 2021, according to a research released by Paysafe. Consumers across North America, …

nmap
Nmap 7.93, the 25th anniversary edition, has been released

Nmap is a widely used free and open-source network scanner. It’s used for network inventorying, port scanning, managing service upgrade schedules, monitoring host or …

risk assessment
Your vendors are likely your biggest cybersecurity risk

As speed of business increases, more and more organizations are looking to either buy companies or outsource more services to gain market advantage. With organizations …

flame
Supply chain risk is a top security priority as confidence in partners wanes

As cyber attackers increasingly look to capitalize on accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions …

Linux
Ransomware attacks on Linux to surge

Trend Micro predicted that ransomware groups will increasingly target Linux servers and embedded systems over the coming years. It recorded a double-digit year-on-year (YoY) …

Don't miss

Cybersecurity news