Please turn on your JavaScript for this page to function normally.
magnify
The importance of vulnerability management for your organization

Everyone is familiar with home burglaries. Criminals case a house looking for easy access through open windows, unlocked doors, open garages, and the like. Hackers take the …

Phishing
How phishing kits are enabling a new legion of pro phishers

Some cybercriminals are motivated by political ideals, others by malice or mischief, but most are only interested in cold, hard cash. To ensure their criminal endeavors are …

Terrascan
Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling

Tenable enhanced Terrascan, an open source cloud native security analyzer that helps developers secure Infrastructure as Code (IaC). The new capabilities enable organizations …

biohazard
Malware variants in 2021: Harder to detect and respond to

Picus Security announced the release of its report which is a comprehensive analysis of attacker behavior and highlights the top 10 most widely seen attack techniques over the …

train
Railway cyber risk management: Raising awareness on relevant threats

ENISA has announced the release of its report – Railway Cybersecurity – Good Practices in Cyber Risk Management for railway organizations. European railway undertakings …

5G
The 5G market is about to take off: What to expect in 2022 and beyond?

5G is recognized as an important infrastructure for both developed and developing countries. By the end of 2021, 79 nations have either commercialized 5G or are conducting 5G …

Google Play
300.000+ users downloaded malware droppers from Google Play

Since August 2021, malware peddlers have managed to spread four families of Android banking trojans via malware droppers introduced in Google Play. They did it by employing a …

lock
The ripple effect: Why protection against supply chain attacks is a must

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …

password
Despite the popularity of password managers, many still use pen and paper

Password managers are a near-defacto standard for organizations, with 86% reporting they are being put to use, according to a Bitwarden survey of over 400 U.S. IT decision …

bomb
Control failures are behind a growing number of cybersecurity incidents

Data from a survey of 1,200 enterprise security leaders reveals that an increase in tools and manual reporting combined with control failures are contributing to the success …

Healthcare
Alarming rise in cyberattacks against healthcare facilities, 68 attacks in Q3 2021 only

Last month saw an alarming rise in cyberattacks against healthcare facilities. Ransomware attacks across the globe locked 68 care providers out of their respective networks …

digital transformation
How can businesses realize the true value of digital transformation?

Although 94% of ITDMs agree that the speed of digital transformation (DX) has accelerated over the last year, decision makers outside of IT departments fail to recognise the …

Don't miss

Cybersecurity news