75% of cardholders prefer contactless cards to other payment methods
Based on responses from 1,000 U.S. cardholders who are familiar with contactless credit/debit card or “tap and pay” technology, a new Entrust Datacard survey reveals that 75% …
Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data
An unauthenticated file read vulnerability (CVE-2020-3452) affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software is being exploited by …
It’s time to tap the next generation of cyber defenders
As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …
Attackers have created a specialized economy around email account takeover
Barracuda released key findings about the ways cybercriminals are attacking and exploiting email accounts. The report reveals a specialized economy emerging around email …
DeimosC2: Open source tool to manage post-exploitation issues
TEAMARES launched DeimosC2, addressing the market need for a cross-compatible, open source Command and Control (C2) tool for managing compromised machines that includes mobile …
Integrated cloud-native security platforms can overcome limitations of traditional security products
To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …
Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …
Week in review: PoC for wormable SharePoint RCE released, how to select a DMARC solution
Here’s an overview of some of last week’s most interesting news and articles: Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into …
Ransomware recovery: Moving forward without backing up
Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …
Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices
A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …
The future of work: 74% believe they will emerge stronger
While much has been written about the immediate pandemic-related challenges, it’s important to apply the lessons learned as many prepare for the future of work. With …
27% of consumers hit with pandemic-themed phishing scams
Phishing is the top digital fraud scheme worldwide related to the COVID-19 pandemic, TransUnion reveals. Among consumers reporting being targeted with digital COVID-19 schemes …
Featured news
Resources
Don't miss
- Building SOX compliance through smarter training and stronger password practices
- AI-driven threats are heading straight for the factory floor
- AI agents break rules in unexpected ways
- The simple shift that turns threat intel from noise into real insight
- Download: Evaluating Password Monitoring Vendors