Data privacy management software market to grow steadily
The data privacy management software market saw soaring growth in 2020 with worldwide revenues up 46.1% year over year. IDC expects this growth to continue over the next …
June 2021 Patch Tuesday: Microsoft fixes six actively exploited zero-days
On this June 2021 Patch Tuesday: Microsoft has fixed 50 security vulnerabilities, six of which are actively exploited zero-days Adobe has delivered security updates for …
DoJ seized $2.3 million paid to the Colonial Pipeline ransomware extortionists
The Department of Justice has seized 63.7 bitcoins currently valued at approximately $2.3 million. These funds allegedly represent the proceeds of a May 8, ransom payment to …
Defending the COVID-19 vaccine rollout with best practices from the cybersecurity industry
Over the past year, pharmaceutical companies and healthcare organizations have rushed to develop a COVID-19 vaccine. It is a testament to the innovations of the medical …
Reformulating the cyber skills gap
Despite a positive (and significant) decrease from over 4 million unfilled cybersecurity jobs in 2019, there is still a staggering 3.12 million global shortage of workers with …
Apple privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8
Apple previewed new privacy protections in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8, which help users better control and manage access to their data. “Privacy has been …
Unauthorized access accounts for 43% of all breaches globally
There has been a 450% surge in breaches containing usernames and passwords globally, according to a ForgeRock report. Researchers also found unauthorized access was the …
Application security approaches broken by rising adoption of cloud-native architectures
The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, a survey of 700 CISOs by Coleman …
Biden’s plan for strengthening US cybersecurity is too soft
As a security professional, I applaud President Biden’s Executive Order on Improving the Nation’s Cybersecurity. Cyberattacks are growing greater in scope and number and have …
Guidance to help cyber threat intelligence analysts apply MITRE ATT&CK
CISA has partnered with the Homeland Security Systems Engineering and Development Institute (HSSEDI), which worked with the MITRE ATT&CK team, to issue guidance to help …
Beware of “Ransomware system update” emails!
Emails referencing the Colonial Pipeline ransomware attack and looking like they’ve been sent from the corporate IT help desk have been hitting employees’ inboxes …
New Google tool reveals dependencies for open source projects
Google has been working on a new, experimental tool to help developers discover the dependencies of the open source packages/libraries they use and known security …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity