
Poor security habits are the ideal recipe for a breach
A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

New infosec products of the week: November 17, 2017
Yoti launches digital identity app The free app is available for Apple and Android phones and takes less than five minutes to set up. People take a selfie and scan a passport …

A third of US businesses do not feel prepared for GDPR deadline
New research by Censuswide captures the preparedness levels of organizations in Europe and the United States for the May 2018 GDPR compliance deadline, as well as their …

Critical flaw in Cisco collaboration products plugged
A critical vulnerability in a dozen Cisco collaboration products based on the Cisco Voice Operating System (VOS) could allow unauthenticated, remote attackers to gain access …

Half of organizations do not audit SSH entitlements
Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …

High-Tech Bridge unveils free application discovery and inventory service
High-Tech Bridge announce the public launch of ImmuniWeb Discovery. The free service is a part of the ImmuniWeb Application Security Testing (AST) Platform. ImmuniWeb …

Free security tool protects Internet users through DNS
IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) launched a free service designed to give consumers and businesses added privacy and security …

Sneaky malware downloader found in apps on Google Play
Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …

What motivates bug hunters?
Crowdsourced security penetration testing outfit Bugcrowd has released its second annual “Mind of a Hacker” report, to provide insight into bug hunters’ …

Measuring fraud trends across various industries
Businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels, according to IDology. Shifting fraud tactics and …

Sharp rise in fileless attacks evading endpoint security
A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. …

Are your enterprise leaders digitally literate?
Only 53 percent of surveyed business technology professionals believe their organization’s leadership is digitally literate, according to ISACA. The other 47 percent either …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless