
CyberMap: Live map of Israel’s cybersecurity ecosystem
During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …

iOS 12 will allow users to share their exact location with emergency services
When iOS 12 is released later this year, it will come with a new feature that will allow iPhone users in the US who call 911 to “automatically and securely” share …

Fraudster exploited US govt staff info stolen in 2015 OPM breach
The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the …

Early detection of compromised credentials can greatly reduce impact of attacks
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

Global IoT tech spending to reach $1.2 trillion in 2022
IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is …

French authorities dismantle Black Hand dark web market
The “Black Hand” forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. …

(IN)SECURE Magazine issue 58 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is …

F-Secure acquires MWR InfoSecurity
F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in …

Week in review: Digital signature spoofing, securing microservices
Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …

Vulnerability in GnuPG allowed digital signature spoofing for decades
A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected …

New infosec products of the week: June 15, 2018
Container security from dev to production Sysdig released Sysdig Secure 2.0, that enables enterprises to secure containers and microservices. The latest version adds …

Exploring the maturity of corporate security awareness programs
Cyber security awareness programs are beginning to gain ground among businesses, but many of the professionals responsible for their implementation are challenged by a lack of …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act