Please turn on your JavaScript for this page to function normally.
bomb
Most IT leaders think partners, customers make their business a ransomware target

Global organizations are increasingly at risk of ransomware compromise via their extensive supply chains. During May and June 2022 Sapio Research polled 2,958 IT …

Signal app
Researchers publish post-quantum upgrade to the Signal protocol

PQShield published a white paper that lays out the quantum threat to secure end-to-end messaging and explains how post-quantum cryptography (PQC) can be added to the Signal …

industry
There is no secure critical infrastructure without identity-based access

Organizational security strategy has long been defined by an internal perimeter enclosing all a company’s information in a single secure location. Designed to keep external …

free cybersecurity courses
7 free online cybersecurity courses you can take right now

The cybersecurity skills shortage continues to present multiple challenges and have repercussions for organizations. The skills gap can be addressed through training and …

eBook: 4 cybersecurity trends to watch in 2022
eBook: 4 cybersecurity trends to watch in 2022

With the rapid acceleration of cloud usage and digitized systems, a host of new security concerns are likely to emerge in the new year. Growing threats around network defense, …

Go-Ahead
Go-Ahead cyberattack might derail UK public transport services

One of the UK’s largest public transport operators, Go-Ahead Group, has fallen victim to a cyberattack. The Go-Ahead Group, which connects people across its bus and rail …

QNAP
DeadBolt is hitting QNAP NAS devices via zero-day bug, what to do?

A few days ago – and smack in the middle of the weekend preceding Labor Day (as celebrated in the U.S.) – Taiwan-based QNAP Systems has warned about the latest …

files
What’s polluting your data lake?

A data lake is a large system of files and unstructured data collected from many, untrusted sources, stored and dispensed for business services, and is susceptible to malware …

phishing
EvilProxy phishing-as-a-service with MFA bypass emerged on the dark web

Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns …

online shopping
62% of consumers see fraud as an inevitable risk of online shopping

59% of consumers are more concerned about becoming a victim of fraud now than they were in 2021, according to a research released by Paysafe. Consumers across North America, …

nmap
Nmap 7.93, the 25th anniversary edition, has been released

Nmap is a widely used free and open-source network scanner. It’s used for network inventorying, port scanning, managing service upgrade schedules, monitoring host or …

risk assessment
Your vendors are likely your biggest cybersecurity risk

As speed of business increases, more and more organizations are looking to either buy companies or outsource more services to gain market advantage. With organizations …

Don't miss

Cybersecurity news