Please turn on your JavaScript for this page to function normally.
World map
CyberMap: Live map of Israel’s cybersecurity ecosystem

During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …

iPhone 8
iOS 12 will allow users to share their exact location with emergency services

When iOS 12 is released later this year, it will come with a new feature that will allow iPhone users in the US who call 911 to “automatically and securely” share …

mask
Fraudster exploited US govt staff info stolen in 2015 OPM breach

The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the …

person
Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

Internet of Things
Global IoT tech spending to reach $1.2 trillion in 2022

IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is …

dark
French authorities dismantle Black Hand dark web market

The “Black Hand” forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. …

(IN)SECURE Magazine 58
(IN)SECURE Magazine issue 58 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is …

money
F-Secure acquires MWR InfoSecurity

F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in …

storm
Week in review: Digital signature spoofing, securing microservices

Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …

GnuPG
Vulnerability in GnuPG allowed digital signature spoofing for decades

A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected …

Cybric dashboard
New infosec products of the week​: June 15, 2018

Container security from dev to production Sysdig released Sysdig Secure 2.0, that enables enterprises to secure containers and microservices. The latest version adds …

users
Exploring the maturity of corporate security awareness programs

Cyber security awareness programs are beginning to gain ground among businesses, but many of the professionals responsible for their implementation are challenged by a lack of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools