Please turn on your JavaScript for this page to function normally.
code
Server-side exploits dominate the threat landscape

Skybox Security released its inaugural Vulnerability and Threat Trends Report, which analyzes vulnerabilities, exploits and threats in play in 2017. Cybercrime is a …

architecture
Integrated IT: The changing role of technology across organizations

The role that IT is playing in business is changing: 85% of the IT professionals surveyed by Insight noted that their executives view the organization as an IT company at …

Intel processor
Intel releases new Spectre microcode updates for some affected processors

Intel has provided a new update on the Spectre patch situation. Skylake fix ready, others to follow “Earlier this week, we released production microcode updates for …

industry biohazard
When crypto-mining malware hits a SCADA network

Stealthy crypto-mining is on track to surpass ransomware as cybercriminals’ most favorite money-making option, and companies with computers and servers that run all day …

roads
Most remain dissatisfied with threat intelligence quality and accuracy

While security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality, according to a …

Swisscom
Data of 800,000 Swisscom customers compromised in breach

Swisscom, the biggest telecom company in Switzerland, has suffered a data breach that resulted in the compromise of personal data of some 800,000 customers, i.e., nearly ten …

email
99 percent of domains are not protected by DMARC

Essentially every global domain is vulnerable to phishing and domain name spoofing. A new report incorporates data from Agari, revealing that 90 percent of its customers have …

architecture
IT ops and engineering are embracing automation to increase business agility

Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on …

location services
How to track smartphone users when they’ve turned off GPS

As it turns out, turning off location services (e.g., GPS) on your smartphone doesn’t mean an attacker can’t use the device to pinpoint your location. A group of …

Hotspot Shield VPN
Hotspot Shield VPN flaw can betray users’ location

A flaw in the widely used Hotspot Shield VPN utility can be exploited by attackers to obtain sensitive information that could be used to discover users’ location and, …

Android
Android devices roped into new Monero-mining botnet

A new Monero-mining bot sprang up several days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are located in China …

HITBSecConf
HITB Security Conference in Amsterdam is all about advanced research

The agenda for Day 2 of the 9th annual HITB Security Conference in The Netherlands has been announced with even more advanced research including new sandbox evasion …

Don't miss

Cybersecurity news