
Leading domain name registrars suffered data breach
Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach. What happened? …

Apple releases fresh security updates for macOS, iOS
In the last few days, Apple has staggered security updates for many of its products, including the recently unveiled macOS Catalina. Safari, tvOS, iPadOS, iOS, iCloud, iTunes …

Office 365 users targeted with fake voicemail alerts in suspected whaling campaign
Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found. They say …

Container usage has grown in complexity, specific security controls are needed
Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

Cybercriminals using custom phishing tools to target the world’s largest tech brands
Cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, …

Most IT pros still haven’t migrated all their users to Windows 10
59% of IT professionals report that they still haven’t migrated all their users to Windows 10, despite the imminent end of regular support for Windows 7 on January 14, 2020, …

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals
Though cybercriminals have been targeting the gaming community since 2010, eSports players, gaming companies, sponsors and viewers will be more at risk over the coming years …

Whitepaper: Busting the myth that more threat intel feeds lead to better security
It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to …

G Suite admins get context-aware access controls, rule-based automated actions and alerts
Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …

Want to overcome patching challenges once and for all? Automation is the key
The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …

The nastiest ransomware, phishing and botnets of 2019
Webroot released its annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the …

Majority of 2019 breaches were the result of unapplied security patches
Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption