Please turn on your JavaScript for this page to function normally.
biohazard
Attackers continue to leverage greater levels of social engineering and sophistication

Despite a nearly four-month absence, the return of Emotet within the last two weeks of September accounted for nearly 12 percent of all malicious email samples in Q3, …

dislike
Do you think you can recognize fake news on Facebook?

With the presidential election season moving into high gear, campaign messaging will soon begin increasing dramatically. But for those of us who get our news from social …

tunnel
Week in review: Active Directory security, Patch Tuesday forecast, stopping lateral phishing attacks

Here’s an overview of some of last week’s most interesting news, interviews and podcasts: How can security teams effectively monitor OT and ICS networks? Modern …

Cisco
Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Cisco has released security updates for a variety of its products – owners of Small Business RV Series Routers, Web Security Appliances and TelePresence devices should …

ISC2 report
Cybersecurity workforce skills gap rises to over 4 million

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million …

patch
November 2019 Patch Tuesday forecast: Out with the old, in with the new

There are only two more Patch Tuesday’s before the new year, but we already have something new to experience this November. Windows 10 version 1909, named the November 2019 …

Adaptiva Evolve VM
New infosec products of the week: November 8, 2019

Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT …

SIEM
SIEM complexity and cloud visibility put companies at risk

Nearly half of companies are unable to remediate insider threats until after data loss has occurred, a Gurucul survey reveals. The study found that lack of visibility into …

world
Global internet freedom declines for the ninth consecutive year

Governments around the world are increasingly using social media to manipulate elections and monitor their citizens, tilting the technology toward digital authoritarianism. As …

IoT security
Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Fewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment, despite that fact that nine out of ten …

data
What financial records do companies need to keep, and for how long?

Companies generate stacks of documents and managing them correctly is crucial. It can be complicated to balance organizational requirements, employee interests, and legal …

Google Play
Mobile security firms will help protect Google Play

Google has partnered with mobile security companies ESET, Lookout and Zimperium to identify potentially harmful and unwanted apps before they are listed on Google Play. …

Don't miss

Cybersecurity news