Please turn on your JavaScript for this page to function normally.
DDoS
The correlation between DDoS attacks and cryptomining

There is a direct correlation between cryptocurrency and DDoS attacks. As the price of cryptocurrency dropped in 2018, leading to decreased profits from cryptomining, hackers …

abstract
Week in review: Password-less security, WPA3 design flaws, new Windows 10 update controls

Here’s an overview of some of last week’s most interesting news and articles: Magento sites under attack through easily exploitable SQLi flaw A recently patched SQL injection …

fire
77% of orgs lack a cybersecurity incident response plan

How prepared are organizations when it comes to withstanding and recovering from a cyberattack? The fourth annual benchmark study on Cyber Resilience by IBM Security and the …

Android smartphone
The surveillance economy has set its sights on smartphone sensors

The most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. …

password
How password-less security benefits helpdesks

IT departments and helpdesk teams are desperately overworked and understaffed, and unfortunately, they continue to get inundated with even more tasks. Helpdesk teams are there …

Who are the biggest targets of credential stuffing attacks?

Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks, in which malicious actors tap automated …

meeting room
Vendor risk management programs are running harder just to stay in place

Increasing pressures in the risk and regulatory environments continue to pose severe challenges to third-party vendor risk management (VRM) programs, a recent survey by …

IoT
Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

In 2019 we have reached a new turning point in the adoption of IoT – more markets and industries are migrating to a cloud-based infrastructure, and as the IoT continues to …

NTT Security report
Finance knocks business and professional services off top spot in four most attacked industries

Finance is the most attacked sector in EMEA, accounting for 30% of all attacks – compared to 17% globally, according to NTT Security. It knocks business and professional …

mainframe
Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

While 85 percent of companies say mainframe security is a top priority, just 33 percent always or often make mainframe decisions based on security. The “Don’t Let Mainframe …

keyboard
What hackers inside your company are after: Convenience

Digital transformation is not a technology trend. Rather, it is a convenience trend. Businesses are changing because customer expectations demand it. Each day, consumers find …

5G
Closed loop automation combats IoT security threats in the 5G age

The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools