Concentric’s AI technologies simplify and automate data security
Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in action and …
How to support women in cybersecurity
Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep …
Massive shadow code risk for world’s largest businesses
Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …
Language-based BEC attacks rising
Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …
Autonomous vehicles can be tricked into erratic driving behavior
When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have …
FluBot takedown: Law enforcement takes control of Android spyware’s infrastructure
An international law enforcement operation involving 11 countries has disrupted the spreading of the FluBot Android malware, which spreads via SMS and MMS and steals sensitive …
Paving your path to SASE: 4 tips for achieving connectivity and security
Today, optimized network connectivity and security are both first-class citizens; IT teams can no longer sacrifice one for the other. As the number of distributed workers …
How cybercriminals are targeting executives at home and their families
Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass …
DDoS threats growing in sophistication, size, and frequency
Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …
Contactless is reigning: Consumers can’t even remember their PIN
Marqeta has released its 2022 State of Consumer Money Movement report looking at consumer payment, banking and shopping preferences, showing digital adoption is on the rise. …
Infosec products of the month: May 2022
Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, …
Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)
A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA