Please turn on your JavaScript for this page to function normally.
risk
3 business application security risks businesses need to prepare for in 2023

Ransomware has lately been the primary method of monetization for threat actors. Still, research has revealed a slight decrease in ransomware attacks and ransomware payments …

open source
Open source skills continue to be in high demand

80% of organizations increased their use of open source software over the last 12 months, according to Perforce Software and the Open Source Initiative. Four out of five …

cloud
50% of organizations exceed their budgeted spend on cloud storage

Enterprises are going all-in on cloud storage, with average stored capacity in the public cloud expected to reach 43% of their total storage footprint by 2024, and the vast …

HIVE ransomware
Authorities shut down HIVE ransomware infrastructure, provide decryption tools

Europol supported the German, Dutch and US authorities in taking down the infrastructure of the prolific HIVE ransomware. This international operation involved authorities …

open source security
How businesses can bolster their cybersecurity defenses with open source

Open-source software enables better security for both large and small organizations. It is the foundation of today’s society and is found throughout a modern application …

ransomware
Supply chain attacks caused more data compromises than malware

The first half of 2022 saw fewer compromises reported due in part to Russia-based cybercriminals distracted by the war in Ukraine and volatility in the cryptocurrency markets, …

Broken glass
Chinese researchers: RSA is breakable. Others: Do not panic!

Quantum computing poses a great opportunity but also a great threat to internet security; certain mathematical problems that form the basis of today’s most popular …

BEC scams
What makes small and medium-sized businesses vulnerable to BEC attacks

According to the FBI’s 2021 Internet Crime Report, business email compromise (BEC) accounted for almost a third of the country’s $6.9 billion in cyber losses that year – …

AI
Most consumers would share anonymized personal data to improve AI products

Despite a difficult economic environment, organizations continue to invest in privacy, with spending up significantly from $1.2 million just three years ago to $2.7 million …

red
Understanding your attack surface makes it easier to prioritize technologies and systems

It has been observed that attackers will attempt to start exploiting vulnerabilities within the first fifteen minutes of their disclosure. As the time to patch gets shorter, …

Python
A closer look at malicious packages targeting Python developers

In this Help Net Security video, Carlos Fernandez, Security Researcher at Sonatype, talks about how their AI system caught packages that attack Python developers with a unique …

NSA
NSA publishes IPv6 Security Guidance

The National Security Agency (NSA) published guidance to help Department of Defense (DoD) and other system administrators identify and mitigate security issues associated with …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools