Please turn on your JavaScript for this page to function normally.
Phishing
Beware of “Ransomware system update” emails!

Emails referencing the Colonial Pipeline ransomware attack and looking like they’ve been sent from the corporate IT help desk have been hitting employees’ inboxes …

open source
New Google tool reveals dependencies for open source projects

Google has been working on a new, experimental tool to help developers discover the dependencies of the open source packages/libraries they use and known security …

Jack Williams
Data sharing in a smart city: Choosing the right approach

Smart cities should, ideally, work as a well-oiled clock, but we’re still far, far away from that. First of all, smart cities are still being built, one siloed segment …

network
The evolution of cybersecurity within network architecture

The vulnerable state of the world during the pandemic paved way for an aggressive onslaught of attacks, with around 39 percent of businesses experiencing a cybersecurity …

code
Keeping pace with evolving code signing baseline requirements

Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …

unified endpoint management
How do I select a unified endpoint management solution for my business?

Having an appropriate unified endpoint management (UEM) solution is important nowadays, not only because of the growing number of devices every organization has in its …

DNS
The role DNS plays in network security

New EfficientIP and IDC research sheds light on the frequency of the different types of DNS attack and the associated costs for the last year throughout the COVID-19 pandemic. …

biometrics
IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …

bank
Banks accelerating their risk management transformation

COVID-19’s disruption has stretched risk management infrastructures to the brink, forcing banks to recalibrate their data, models and processes for stress testing, impact …

week in review
Week in review: Kali Linux 2021.2, the human cost of understaffed SOCs, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more! Offensive …

USA flag
White House urges private sector to enhance their ransomware defenses

In light of the ransomware attacks hitting high-profile targets such as the Colonial Pipeline and JBS, the White House has issued an open letter to private sector companies, …

CODESYS
Critical vulnerabilities identified in CODESYS ICS automation software

Researchers have identified 10 vulnerabilities in CODESYS automation software for industrial control systems. Some are of high and critical severity. “The vendor rated …

Don't miss

Cybersecurity news