How the SamSam attacker stole millions from US companies
There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …
Top 10 list of dark web activities that indicate a breach
Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. …
Digital trust: Security pros, business execs and consumers see it differently
An extensive global survey of consumers, cybersecurity professionals and business executives about their views on digital trust conducted by analyst firm Frost & …
Insights into consumer attitudes to biometric payments
Biometric payments are poised for significant growth, but substantial consumer security concerns could put its future at risk according to a new report from Transaction …
Enterprise IT modernization: Replace prerelational DBMS systems
Prerelational database management systems (DBMSs) are aging technology, and the number of applications using these systems is declining. The market share for prerelational …
Analysis: Reported data breaches in Australia
The Office of the Australian Information Commissioner (OAIC) has published the first full quarter report on data breaches that fall under Notifiable Data Breaches scheme and, …
CEO guidance: Handling dynamic change in the cybersecurity industry
In a little over 18 months since SonicWall split from Dell, the company has become operationally and financially independent. “In fact, while achieving independence, we …
Idaho inmates hacked prison system to add money to their accounts
364 inmates at five correctional facilities in Idaho have managed to add nearly a quarter million dollars worth of credit to their JPay accounts by exploiting a vulnerability …
Building a sound security strategy for an energy sector company
As more and more attacks against companies working in the energy sector become public, it is becoming increasingly clear that those systems are far from impermeable. And …
Risks grow, yet security is still an afterthought in many IoT strategies
Trend Micro released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things related cyber attack, however …
Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning
Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control …
Samsung SmartThings Hub vulnerabilities allow attackers inside your home
Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, control and interfere with devices …
Featured news
Resources
Don't miss
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services
- What types of compliance should your password manager support?