Please turn on your JavaScript for this page to function normally.
ISO 27001
ISO 27001 & cybersecurity training and qualifications: Now in New York

Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and live and online …

phishing
Which phishing messages have a near 100% click rate?

Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rates decrease. For …

money
The economic impact of cybercrime? Almost $600 billion

Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, according to a …

certificate
Counterfeit digital certificates for sale on underground forums

Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and …

quantum
New infosec products of the week​: February 23, 2018

Cisco offers cloud-based endpoint security solutions for MSSPs Cisco is offering MSSPs security, visibility, and control of customer endpoints. Their endpoint security …

Laptop
Email inboxes still the weakest link in security perimeters

Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most …

gap
Trend Micro fixes serious vulnerabilities in Email Encryption Gateway

Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a …

Intel CPU
Intel releases Spectre 2 microcode updates for Kaby Lake, Coffee Lake, Skylake

Intel has released to OEMs a new set of Spectre firmware updates. They include microcode for Kaby Lake, Coffee Lake, and Skylake processors. “This represents our 6th, …

What if defenders could see the future? Many clues are out there

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …

strategy
How organizations are confronting escalating third-party cyber risk

Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the …

BEC scams
BEC scammers actively targeting Fortune 500 companies

Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is …

AWS
To prevent data breaches, AWS offers S3 bucket permissions check to all users

Amazon Web Services (AWS) has announced that all customers can now freely check whether their S3 buckets are leaking stored data. “Previously available only to Business …

Don't miss

Cybersecurity news