Please turn on your JavaScript for this page to function normally.
Headache
Attack traffic increased by 32 percent in 2018

Attack traffic observed by F-Secure’s network of decoy honeypots in 2018 increased by 32 percent over the previous year and increased fourfold in the latter half of 2018 …

Anomali
Photo gallery: RSA Conference 2019 Expo

RSA Conference 2019 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from …

Broken glass
If an organization has been breached, it’s more likely to be targeted again

FireEye released the Mandiant M-Trends 2019 report at the RSA Conference. The report shares statistics and insights gleaned from Mandiant investigations around the globe in …

phishing
Phishers shift efforts to attack SaaS and webmail services

There was some good news and some bad news for the Internet-using public in early 2019. The good news is that the total number of conventional, spam-based phishing campaigns …

Danger
How malware traverses your network without you knowing about it

A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of …

DevSecOps
The patterns of elite DevSecOps practices

As DevOps practices are maturing rapidly, organizations with elite DevSecOps programs are automating security earlier in the development lifecycle and managing software supply …

Cloud
Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Worldwide spending on public cloud services and infrastructure is forecast to reach $210 billion in 2019, an increase of 23.8% over 2018. Although annual spending growth is …

World target
Ongoing global cyber espionage campaign broader than previously known

A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter …

CEO
Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a …

user
Human behavior can be your biggest cybersecurity risk

Changes in user behavior are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that …

vectors
A strong security posture starts with application dependency mapping

More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application …

cloud
How cloud storage providers can preempt cyber attacks with business continuity

Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools