Please turn on your JavaScript for this page to function normally.
Orbitz
880,000 payment cards, user info hit in Orbitz data breach

Expedia subsidiary Orbitz has revealed that a legacy Orbitz travel booking platform had been compromised and personal user information and payment card data might have been …

email
Understanding email fraud: Do you have visibility into email threats?

82% of boards are concerned with email fraud, and 59% consider it a top security risk – no longer just an IT issue. Yet 30% of respondents to a survey conducted by …

industry
Middle East oil and gas companies are unprepared to address OT cyber risk

Cyber security breaches in the Middle East are widespread and frequently undetected, with 30 percent of the region’s attacks targeting operational technology (OT), finds a new …

nmap
Nmap 7.70 released: Better service and OS detection, 9 new NSE scripts, and more!

Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network …

brain
AI deployments to drive investments in storage, networking, and cloud infrastructure

The race for making perfect hardware to accelerate artificial intelligence (AI) applications is heating up and many companies are jumping in with their products and solutions. …

editor
Privilege escalation on Unix machines via plugins for text editors

Several of the most popular extensible text editors for Unix environments could be misused by attackers to escalate privileges on targeted systems, SafeBreach researchers have …

RSA Conference Innovation Sandbox
RSA Conference Innovation Sandbox Contest 2018 finalists announced

RSA Conference announced the 10 finalists for its annual RSAC Innovation Sandbox Contest. The competition offers a leading platform for entrepreneurial cyber security …

Eyes
A look inside the big business of cybercrime

For three months, Armor’s Threat Resistance Unit (TRU) research team compiled and analyzed data from the black market to shed light on the type of activity threat actors are …

Cambridge Analytica
Cambridge Analytica and Facebook’s privacy storm: Latest developments

A day before the most recent exposé on Strategic Communication Laboratories (SCL)/Cambridge Analytica’s exploitation of user data syphoned out of Facebook to fuel …

Money
Gartner unveils IT cost-optimization priority for CIOs

IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey by Gartner. Survey …

Intel processor
New Intel processors to have hardware-based protections against Meltdown, Spectre 2

Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years. In addition to this, the …

stock price
AI services market to reach $188 billion worldwide by 2025

Artificial intelligence (AI) has worked its way into a variety of industries, from the obvious (autonomous vehicles) to the hidden (anti-money laundering due diligence). But …

Don't miss

Cybersecurity news