Paying ransom doesn’t guarantee data recovery
OwnBackup announced the findings of a global survey conducted by Enterprise Strategy Group (ESG) that reveals a staggering 79% of respondent organizations have been targeted …
86% of developers don’t prioritize application security
Secure Code Warrior released findings from its survey, which found that developers’ actions and attitudes toward software security are in conflict. While many developers …
How many steps does it take for attackers to compromise critical assets?
The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …
The latest salary trends in the global DevOps industry
Puppet revealed the findings of its report which revealed how the post-pandemic environment directly impacted DevOps salaries as organizations invest in competitive …
Embedded security market to reach $9 billion by 2027
The embedded security market size is projected to grow from $6.8 billion in 2022 to $9 billion by 2027; it is expected to grow at a CAGR of 5.9% from 2022 to 2027, according …
Microsoft asks bug hunters to probe on-premises Exchange, SharePoint servers
Bug hunters that discover and report high-impact security vulnerabilities in on-premises Exchange, SharePoint and Skype for Business may earn as much as $26,000 per eligible …
Digital transformation requires security intelligence
Embracing change and resilience became the mantra for business continuity as organizations powered through the pandemic. Incorporating digital technologies were critical to …
63% of organizations paid the ransom last year
A record 71% of organizations were impacted by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of those that were …
How often do developers push vulnerable code?
A Tromzo report reveals developers remediate only 32% of vulnerabilities and regularly push vulnerable code. The report was based on a survey of more than 400 U.S.-based …
Malicious actors targeting the cloud for cryptocurrency-mining activities
Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could …
Internal auditors stepping up to become strategic advisors in the fight against fraud
A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …
Automotive cybersecurity market to reach $5.1 billion by 2027
The global automotive cybersecurity market size is projected to grow from $2.1 billion in 2021 to $5.1 billion by 2027, at a CAGR of 20.3%, according to ResearchAndMarkets. …
Featured news
Resources
Don't miss
- Open-source AI pentesting tools are getting uncomfortably good
- What boards need to hear about cyber risk, and what they don’t
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups