Please turn on your JavaScript for this page to function normally.
Biden legitimizes cryptocurrency with regulatory exploration

For some time, cryptocurrency was considered a fringe currency – a libertarian means of investing that challenged the traditional framework of brokers, trade desks and …

code
Take a walk on the client side: The importance of front-end JavaScript security assessments

As e-skimming, Magecart, and other types of front-end attacks grow in frequency and severity, businesses are faced with finding ways to protect the front-end (i.e., client …

wire
Perimeter intrusion detection systems market to reach $5.98 billion by 2026

The global perimeter intrusion detection systems market is expected to witness an incremental growth of $5.98 billion between 2021 and 2026. Technavio expects the growth to …

XONA Systems
On-demand webinar: Demystifying zero trust to protect connected assets in OT

Over the past few years, zero trust has become a commonly used phrase for security professionals. While we may understand that a zero-trust framework or architecture should be …

backup
Veeam fixes critical RCEs in backup solution (CVE-2022-26500, CVE-2022-26501)

Veeam Software has patched two critical vulnerabilities (CVE-2022-26500, CVE-2022-26501) affecting its popular Veeam Backup & Replication solution, which could be …

bomb
Financially motivated threat actors willing to go after Russian targets

As Ukrainian organizations are getting hit with yet another data-wiping malware, financially motivated threat actors are choosing sides and some of them are expressing their …

shark
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …

code
The simple secret to app security? Time

The thing about being a security consultant is that people are always looking to you for the “secret” to building a secure digital anything. And by “secret,” they usually mean …

skull binary
Malicious web application requests skyrocketing, bad actors stealthier than ever before

Radware released report findings which underscore 2021 as the year of the web application attack. Between 2020 and 2021, the number of malicious web application requests …

money
Top threats for the financial sector

The potential financial, operational, and reputational impact of ransomware makes it the top threat facing financial services organizations, according to a report from …

Car
Top automotive tech obstacles: Cybersecurity, software quality and functional safety

Molex announced the results of a global survey that examines the pace of innovation accelerating the development of next-generation vehicle architectures and driving …

SaaS
SaaS revenue declined by 46% in 2021

Software-as-a-service (SaaS) companies saw their revenue growth slow by 46% in 2021 compared to 2020, according to a study by Paddle. The result of qualitative and …

Don't miss

Cybersecurity news