Ransomware attack levels soaring, now accounting for 69% of all attacks involving malware
Ransomware attacks have reached ‘stratospheric’ levels in Q2 2021, now accounting for 69% of all attacks involving malware. That is among the most disturbing finding in the …
SaaS applications investment growing despite underutilization of app licenses by employees
Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only …
Future of work: Cybersecurity and hybrid working as top two enterprise priorities
The pandemic has changed technology priorities for organizations worldwide finds a report from Omdia on the future of work. The top two enterprise priorities are now …
A malicious document could lead to RCE in Apache OpenOffice (CVE-2021-33035)
Apache OpenOffice, one of the most popular open-source office productivity software suites, sports a RCE vulnerability (CVE-2021-33035) that could be triggered via a specially …
Creepy data collection and sharing remain common on popular apps
In a recent Mozilla review of the privacy features of 21 popular video call apps, only two were singled out for outstanding features (Signal and Threema). Meanwhile, three …
Plug critical VMware vCenter Server flaw before ransomware gangs start exploiting it (CVE-2021-22005)
VMware has fixed 19 vulnerabilities affecting VMware vCenter Server and VMware Cloud Foundation, the most critical of which is CVE-2021-22005. “This vulnerability can be …
How to protect the corporate network from spyware
It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …
We cannot afford for healthcare security to be the “lowest-hanging fruit”
Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …
How do I select a data privacy management solution for my business?
As companies collect more personal data, concerns around its privacy are growing too. People are becoming aware of the value their data holds and how it can be used for …
How digital transformation impacted CIO and CTO roles
Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …
2 million malicious emails bypassed secure email gateways in 12 months
Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …
Whole cloud spending to surpass $1.3 trillion by 2025
Over the past decade, cloud computing has become the foundation for the delivery of mobile and content services as well as an alternative to traditional enterprise computing …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)