Please turn on your JavaScript for this page to function normally.
Cynet platform
Cynet Free IR tool offering empowers responders to know and act against active attacks

The saying that there are two types of organizations, those that have gotten breached and those who have but just don’t know it yet, has never been more relevant, making sound …

WordPress
WordPress updates are digitally signed at last!

WordPress 5.2 is out and brings a number of functional improvements, but the great news for those who are worried about the security of their installation is the …

Cisco
Critical flaw allows attackers to take over Cisco Elastic Services Controllers

Cisco has patched a critical, remotely exploitable authentication bypass vulnerability in Cisco Elastic Services Controller (ESC), a popular enterprise software for managing …

cloud
Executing a multi-cloud strategy: Crawl, walk, run

Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …

healthcare
Is curiosity killing patient privacy?

The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …

vault
Open banking establishes new access to banks’ networks, creating additional security issues

As more markets adopt open banking — which mandates banks to open their systems to third parties — it will be increasingly critical for banks to ensure the security of not …

5G
Mobile carriers believe security and reliability concerns will increase with 5G

Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they …

maze
Senior payment executives’ thoughts on SME PCI compliance and security

Acquirers now hold higher expectations for compliance than they did 12 months ago, Sysnet Global Solutions has established. What is your current compliance rate? The annual …

Microsoft Exchange
Researchers discover highly stealthy Microsoft Exchange backdoor

An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails. LightNeuron …

Europe
Bad actors increasingly spreading misinformation via social media ahead of EU elections

Bad actors are amplifying misinformation content directed at EU member states to shape public perception, a report by SafeGuard Cyber reveals. The report provides evidence and …

chip
Unhackable? New chip makes the computer an unsolvable puzzle

A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …

money
C-Suite execs and policy makers find cybersecurity technology investments essential

The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …

Don't miss

Cybersecurity news