Week in review: Keeping up with ransomware, critical PHP RCE exploited, DevOps firewall
Here’s an overview of some of last week’s most interesting news and articles: Leading domain name registrars suffered data breach Web technology company Web.com …
Keeping up with the evolving ransomware security landscape
Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware …
New infosec products of the week: November 1, 2019
Jetico releases BestCrypt Volume Encryption Enterprise Edition for Mac Jetico launched BestCrypt Volume Encryption – Enterprise Edition for Mac. Expanding on many years of …
How has your organization’s risk level changed in the past 12 months?
More than half of risk professionals worldwide say their organization’s risk levels have increased in the past 12 months, according to new research from ISACA, CMMI Institute …
IT teams are embracing intent-based networking, investing in AI technologies
The network is vital to today’s digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is …
Security services and network security still top spending priorities for CISOs in MENA
Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …
Leading domain name registrars suffered data breach
Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach. What happened? …
Apple releases fresh security updates for macOS, iOS
In the last few days, Apple has staggered security updates for many of its products, including the recently unveiled macOS Catalina. Safari, tvOS, iPadOS, iOS, iCloud, iTunes …
Office 365 users targeted with fake voicemail alerts in suspected whaling campaign
Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found. They say …
Container usage has grown in complexity, specific security controls are needed
Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …
Cybercriminals using custom phishing tools to target the world’s largest tech brands
Cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, …
Most IT pros still haven’t migrated all their users to Windows 10
59% of IT professionals report that they still haven’t migrated all their users to Windows 10, despite the imminent end of regular support for Windows 7 on January 14, 2020, …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities