70% of financial service providers are implementing API security
Financial service providers, such as banks and credit card companies, use a vast amount of APIs, which makes them an attractive target for threat actors. That’s why API …
Building trust in a zero-trust environment
A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all …
How to contain a privileged access breach and make sure it doesn’t happen again
When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …
The importance of building in security during software development
Checkmarx released the UK findings of its report which found that 45% of organizations have suffered at least two security breaches as a direct result of a vulnerable …
Poor data sanitization practices put public sector data at risk
A research launched by Blancco Technology Group reveals current practices and policies for device sanitization within the public sector. Researchers spoke to 596 government IT …
Model contract language for medical technology cybersecurity published
Medical technology companies and health delivery organizations have a new template for agreeing on cybersecurity contractual terms and conditions to reduce cost, complexity …
Cloud computing market to reach $1,554.94 billion by 2030
The global cloud computing market is expected to reach $1,554.94 billion by 2030, registering a CAGR of 15.7%, according to ResearchAndMarkets. Cloud systems thrive at …
Week in review: Linux bug gives root access to attackers, UPS devices’ vulns, IoT security for OEMs
Here’s an overview of some of last week’s most interesting news, articles and interviews: Mozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, …
Kali Linux on bare-metal gets snapshotting functionality
The Offensive Security team has released Kali Unkaputtbar, a new feature that allows Kali Linux installed on bare-metal to make system snapshots automatically, thus enabling …
New infosec products of the week: March 11, 2022
Here’s a look at the most interesting products from the past week, featuring releases from AvePoint, Dasera, Elastic, Imperva, Palo Alto Networks, Reciprocity, SpyCloud, and …
Shipping fraud quickly emerging as one of the top fraud types
The continuous growth of e-commerce could be behind a surge in shipping fraud, which is now the fastest growing type of digital fraud worldwide, according to a TransUnion …
Cosumers don’t think they can dodge identity fraud
Nearly one in 10 smartphone users in the UK (9%), as many as 5.7 million people, have fallen victim to identity fraud in the last 12 months, according to a research by GBG. …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)