Please turn on your JavaScript for this page to function normally.
vulnerability
Whitepaper: Identifying Web Attack Indicators

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector …

abstract
Week in review: MFA effectiveness, SMBs and Win7 security, the quantum computing threat

Here’s an overview of some of last week’s most interesting news, interviews and articles: Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, …

Microsoft impersonate
Microsoft: Any form of MFA takes users out of reach of most attacks

The apparent ease with which SIM hijacking attacks are being perpetrated to get the targets’ second authentication factor for crucial accounts (online banking, …

Android explode
Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, Xiaomi devices

A privilege escalation vulnerability affecting phones running Android 8.x and later is being leveraged by attackers in the wild, Google has revealed. Interestingly enough, the …

laptop
New infosec products of the week: October 4, 2019

Anomali Altitude automates detection, analysis, and threat response The Anomali Altitude platform delivers Anomali Lens, Anomali ThreatStream, and Anomali Match. The …

encryption
Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

IoT is one of the fastest growing trends in technology today, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI …

insider threat
Educational organizations massively vulnerable to cyber attacks

The education sector is facing a crisis as schools grapple with high levels of risk exposure – driven in large part by complex IT environments and digitally savvy student …

check
Being compliant with laws and regulations is not a guarantee against data breaches

Compliance is not a guarantee against data breaches. These are the results of the Advisera survey carried out with 605 respondents, coming from countries on five continents, …

Windows 7
Microsoft will continue providing Windows 7 security updates for SMBs

According to the latest Alert Logic’s research, most devices in small and midsize businesses (SMBs) run Windows versions that are expired or are about to expire soon. …

Good
Good cybersecurity comes from focusing on the right things, but what are they?

“There is no wrong way into the security field and it’s never too late to make a career switch that will take you there,” says Mark Orlando, CTO at Raytheon …

ISC2 report
How security programs and breach history influence company valuations

96% of cybersecurity professionals indicated that cybersecurity readiness factors into the calculation when they are assessing the overall monetary value of a potential …

lock
Executives have to make cybersecurity a priority in order to secure their business

Businesses and organizations of all sizes have steadily begun to recognize the importance of cybersecurity to their success. As spending and awareness of the importance of …

Don't miss

Cybersecurity news