IIS attacks surge from 2,000 to 1.7 million over last quarter
IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …
Growing intrusion trends: A perspective on today’s most sophisticated cyberattacks
According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety …
Cryptomining dethrones ransomware as top threat in 2018
Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their …
Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …
Most consumers don’t trust companies to keep personal information secure
High-profile security breaches and changing regulations have raised consumer concerns and pressured businesses, establishing 2018 as a landmark year in the data economy. …
Apple fixes iOS 12 passcode bypass vulnerabilities
Apple has released security updates to address a number of vulnerabilities in iCloud for Windows and iOS, some of which can be exploited by attackers to take control of an …
The end of Google+: Low usage and an API bug that exposed user data
Google has announced that it will be closing down the consumer version of Google+, its failed answer to Facebook, and is introducing more granular Google Account permissions, …
Four critical KPIs for securing your IT environment
In 2018, the average cost of a data breach is more than $3.75 million, and experts expect this number to rise in the coming years. This staggering—and potentially …
945 data breaches led to compromise of 4.5 billion data records in first half of 2018
Gemalto released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 945 data breaches led to 4.5 billion data records being …
Mobile security threats: Lack of visibility is putting businesses at risk
A significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks, according to a study conducted by Enterprise …
Health websites routinely share your activity with 57 third-parties
B9 Systems conducted research into the use of cookies by health websites and discovered that all the major players share your private information with, on average, 57 other …
Most hosting providers take too long to remove malware distribution sites
How long does it take web hosting providers to remove malware distribution sites parked on their network? Roman Hussy, the Swiss security activist behind abuse.ch, says that, …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform