Cyber attacks on Ukraine: DDoS, new data wiper, cloned websites, and Cyclops Blink
This Thursday morning, Russia started its invasion on Ukraine and, as predicted, the attacks in the physical world have been preceded and accompanied by cyber attacks: Renewed …
How Log4Shell remediation interfered with organizations’ cybersecurity readiness
(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …
How to keep pace with rising data protection demands
The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …
Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered
Sophos released a research that details code similarities in the general purpose Dridex botnet and the little-known ransomware, Entropy. The similarities are in the software …
Ransomware wreaked havoc last year, manufacturing was most targeted
IBM Security released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 …
How mobile app usage data could reveal a person’s identity
The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the …
Automotive cybersecurity industry to reach $32.41 billion by 2030
The global automotive cybersecurity industry was pegged at $7.23 billion in 2020, and is expected to reach $32.41 billion by 2030, growing at a CAGR of 16.6% from 2021 to …
Help Net Security: Healthcare Cybersecurity Report has been released
Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …
How configuration assessments help improve cyber defenses
There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …
Multi-tool/multi-cloud environments reaching the limit of their efficacy
CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud …
Consumers don’t mind handing out their data for better user experience
In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)