Please turn on your JavaScript for this page to function normally.
drown
Leadership and recruitment changes needed to address burnout in cybersecurity

Most organizations—across almost every industry—have been forced to implement extensive digital components to their everyday operations so they can function efficiently. With …

IIoT
How IIoT solutions can optimize industrial supply chain operations

Ivanti Wavelink announced the results of a joint survey with VDC Research regarding the state of industrial supply chain operations and the adoption of Industrial Internet of …

data
308,000 exposed databases discovered, proper management is key

Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, the attack surface management team analyzed instances hosting …

people
Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% …

consumer
Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements

CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy …

danger
The 15 most exploited vulnerabilities in 2021

In 2021, threat actors aggressively exploited newly disclosed critical software vulnerabilities to hit a broad set of targets worldwide, says the latest advisory published by …

magnifying glass
Top 5 security analytics to measure

You don’t need a Ph.D. in cybersecurity to recognize the importance of security analytics. Security analytics uses data analysis – often aided by machine learning – to …

money
Ransomware is up and victims are paying

Sophos released a survey and review of real-world ransomware experiences in a report which shows that 66% of organizations surveyed were hit with ransomware in 2021, up from …

hand
Cybercriminals deliver IRS tax scams and phishing campaigns by mimicking government vendors

Cybercriminals are leveraging advanced tactics in their phishing-kits granting them a high delivery success rate of spoofed e-mails which contain malicious attachments right …

Post-pandemic priorities for security leaders

Info-Tech Research Group has published its annual report on the priorities for security leaders. The report combines insights from the 2022 security priorities survey and …

cloud
Are businesses ready to implement cloud-native development?

OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark …

Linux
Nimbuspwn bugs allow attackers to gain root privileges on some Linux machines (CVE-2022-29799, CVE-2022-29800)

Microsoft has unearthed two security vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon that may be exploited by attackers to gain root on many …

Don't miss

Cybersecurity news