
Have you been fooled by Russian propaganda? Facebook’s new tool will show you
If you’re one of those people who mentally check out of news the day before Thanksgiving, you might have missed Facebook’s announcement about a new tool aimed at …

Should you risk buying your child smart toys currently on offer?
As the end-of-the-year holiday season approaches, many security researchers, consumer groups and even governments warn against buying specific products or, at least, to make …

Imgur confirms breach, 1.7 million users affected
Popular image hosting website Imgur has announced on Friday that hackers stole usernames and passwords of 1.7 million of its users. The breach dates back to 2014, when Imgur …

Infosec expert viewpoint: DevOps security
A Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation are …

Google knows where Android users are even if they disable location services
As it turns out, turning off location services on Android devices does not mean that Google can’t pinpoint your location. According to a recent Quartz report, since the …

Uber suffered massive data breach, paid hackers to keep quiet about it
Uber suffered a breach in October 2016, which resulted in the compromise of sensitive information of some 57 million users and drivers, and paid off the hackers to keep mum …

Holiday season scams: Fake deals, fake stores, fake opportunities
Black Friday is widely regarded as the beginning of the US (and increasingly global) Christmas shopping season. Cyber Monday, which comes three days later, was created to …

Only 12% or organizations are likely to detect a sophisticated cyber attack
Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s …

Defining and securing the Internet of Things
The EU Cybersecurity Agency ENISA published a report on the security of the Internet of Things (IoT). The study aims to set the scene for IoT security in Europe. It serves as …

Intel chips riddled with deadly flaws
As we’re waiting for security researchers to detail the Intel Management Engine vulnerability that can allow attackers to run undetectable, unsigned code on machines …

Webinar: Running a SOC with security orchestration
Whether an Enterprise SOC or an MSSP the challenges of too many alerts, disconnected tools and a shortage of analysts continue to plague security operations. Security …

Hackers hit Sacramento transit system, demand money to stop attack
Hackers looking for a payout have hit the Sacramento Regional Transit (SacRT) system, defacing the agency website, erasing data from some of its servers, and demanding money …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless