Please turn on your JavaScript for this page to function normally.
modem router
Consumer routers targeted by DNS hijacking attackers

Owners of a slew of D-Link, ARGtek, DSLink, Secutech, TOTOLINK and Cisco consumer routers are urged to update their device’s firmware, lest they fall prey to ongoing DNS …

patch
April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

April Patch Tuesday is nearly here with two significant topics of concern. The first relates to end-of-service milestones and the second issue is browser exploits. Let’s start …

whois
WHOIS after GDPR: A quick recap for CISOs

2018 was a big year for data protection with the implementation of the General Data Protection Regulation (GDPR) last May — forcing CISOs and other professionals to rethink …

Face
Only 12% of enterprises are consistently able to detect insider threats

73 percent of IT professionals believe that insider attacks have become more frequent in the past year. Additionally, 59 percent said that their organizations experienced at …

shadow mining
What is shadow mining and why is it a security threat?

The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar …

AlgoSec CloudFlow
New infosec products of the week: April 5, 2019

Free cybersecurity threat assessment for midsize and large organizations Cynet unveiled the Cynet Threat Assessment program. The free offering for organizations with 500 or …

labyrinth
85% of organizations fail to meet even basic PAM security hygiene

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access …

cloud binary
Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, grew …

Xiaomi
Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app

Check Point Research discovered a vulnerability in one of the preinstalled apps on devices manufactured by one of the world’s biggest mobile vendors, Xiaomi. The vulnerability …

Microsoft Azure
Microsoft rolls out new security capabilities for Azure customers

Microsoft has announced new security features for customers of its Azure cloud computing service. They are a mix of features for storage and compute services: Advanced Threat …

connections
The security challenges that come with serverless computing

Serverless computing (aka Function-as-a-Service) has been a boon to many enterprises: it simplifies the code development and deployment processes while improving utilization …

skull
Attackers fighting back against security teams while also targeting supply chains

According to the world’s leading IR professionals, increasingly sophisticated attacks involving instances of “island hopping,” counter incident response (IR), and lateral …

Don't miss

Cybersecurity news