Please turn on your JavaScript for this page to function normally.
Cisco
Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

An unauthenticated file read vulnerability (CVE-2020-3452) affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software is being exploited by …

user
It’s time to tap the next generation of cyber defenders

As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …

email
Attackers have created a specialized economy around email account takeover

Barracuda released key findings about the ways cybercriminals are attacking and exploiting email accounts. The report reveals a specialized economy emerging around email …

DeimosC2
DeimosC2: Open source tool to manage post-exploitation issues

TEAMARES launched DeimosC2, addressing the market need for a cross-compatible, open source Command and Control (C2) tool for managing compromised machines that includes mobile …

cloud
Integrated cloud-native security platforms can overcome limitations of traditional security products

To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …

reload
Data crisis: Companies pivot from disruption to transformation

Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …

question
Week in review: PoC for wormable SharePoint RCE released, how to select a DMARC solution

Here’s an overview of some of last week’s most interesting news and articles: Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into …

danger
Ransomware recovery: Moving forward without backing up

Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …

bomb
Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …

video call
The future of work: 74% believe they will emerge stronger

While much has been written about the immediate pandemic-related challenges, it’s important to apply the lessons learned as many prepare for the future of work. With …

email
27% of consumers hit with pandemic-themed phishing scams

Phishing is the top digital fraud scheme worldwide related to the COVID-19 pandemic, TransUnion reveals. Among consumers reporting being targeted with digital COVID-19 schemes …

Work
IT teams failing to deliver a positive remote employee experience

Conducted during the coronavirus pandemic, 1E unveils the findings of an analysis of the remote employee experience and the digital workplace in 2020. Vanson Bourne and 1E …

Don't miss

Cybersecurity news