
Microsoft offers mitigation advice for DDE attacks scenarios
Microsoft has published a security advisorty containing DDE attack mitigation instructions for both users and admins. What’s a DDE attack? For a while now, attackers …

Chrome to start blocking unwanted redirects
“1 out of every 5 feedback reports from Chrome users on desktop mention encountering some type of unwanted content, and we take this feedback seriously when considering …

Connected technologies will accelerate security threats to healthcare industry
Life sciences and healthcare companies will follow the lead of other industries and integrate connected technologies including Internet of Things (IoT) and intelligent …

Top GDPR compliance risks: Breach notification, data mapping, managing consent
The International Association of Privacy Professionals (IAPP) conducted a survey that gauges the perceived risks among privacy professionals of not complying with various …

Top digital transformation challenges? Cybercrime and espionage
In Frost & Sullivan’s recent survey covering end-user perspectives on navigating digital transformation, 54 per cent of IT professionals cited cybercrime and …

The Wild West of drive-by cryptocurrency mining
As more and more Coinhive clones continue popping up, chances of users’ CPU power being hijacked for cryptocurrency mining are rising. According to Malwarebytes’ …

Artful Netflix-themed phishing campaign can fool many
A recently spotted Netflix-themed phishing email campaign is so well crafted that it’s difficult for many less tech-savvy users to spot the scam. Extremely convincing …

IoT anxiety is consuming security professionals
A new survey conducted by Forrester Consulting unveiled that security and LoB leaders are experiencing high levels of anxiety due to IoT/OT security concerns, largely due to …

1 in 5 IT security pros still use paper to track accounts and passwords
Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening …

Innovation drivers for the global web application firewall market
Web applications are vital technologies used by every online company to communicate with employees, partners, customers, and potential customers. The exposed nature of these …

Worldwide digital transformation predictions
While IDC continues to see tremendous momentum and influence of digital transformation (DX) on technology spending worldwide, across all geographies and industries, 59% of …

BEC scammers stealing millions from home buyers
Business Email Compromise (BEC) scams have been on the rise for the last few years, and no industry is safe from these scammers. It has been revealed last week that art …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless