Please turn on your JavaScript for this page to function normally.
5G
Most decision makers expect AI and 5G to impact their cybersecurity strategy

An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …

Unicredit
UniCredit says personal data of 3 million customers was compromised

Italian global banking and financial services giant UniCredit has announced that its cybersecurity team has identified “a data incident” that resulted in the …

PHP
PHP RCE flaw actively exploited to pop NGINX servers

A recently patched vulnerability (CVE-2019-11043) in PHP is being actively exploited by attackers to compromise NGINX web servers, threat intelligence firm Bad Packets has …

fire
DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable …

wireless
New protocol extends Wi-Fi range, can be used with existing hardware

A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young …

cloud
IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …

IoT
Integrating security into IoT projects is not easy, but it’s increasingly urgent

With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to …

brain
Despite enthusiasm for AI adoption, governments are experiencing challenges

Public-service executives in Europe are optimistic and enthusiastic about the impact of artificial intelligence (AI) on government operations and services but face challenges …

ThreatConnect whitepaper
Whitepaper: Building a Threat Intelligence Programme

ThreatConnect surveyed more than 350 UK information security decision makers. Building a Threat Intelligence Programme discusses research findings on best practices and impact …

geometry
Week in review: Avast breach, deepfakes, VisibleV8 monitors JavaScript in the wild

Here’s an overview of some of last week’s most interesting news and articles: Phishing attacks are a complex problem that requires layered solutions Most cyber …

phishing
Phishers have been targeting UN, UNICEF, Red Cross officials for months – and still do

Researchers have brought to light a longstanding phishing campaign aimed at the UN and its various networks, and a variety of humanitarian organizations, NGOs, universities …

Splunk Mission Control
New infosec products of the week: October 25, 2019

Delta Risk ActiveEye 2.0 eliminates more than 95% of false positives With a focus on advanced security automation, the ActiveEye 2.0 platform eliminates more than 95 percent …

Don't miss

Cybersecurity news