Please turn on your JavaScript for this page to function normally.
Windows
Is Windows ShimCache a threat hunting goldmine?

Enterprise-wide threat hunting sounds like a daunting task and for inexperienced forensic analysts it certainly can be. However, there are various techniques that can be used …

EU
Sumo Logic: What can you learn from our approach to GDPR?

Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, their purpose-built, cloud-native service analyzes more than 100 …

DevSecOps
Rules automation puts the “Sec” in DevSecOps

Imagine if safety were an afterthought in automobiles: Manufacturers would create a pristine new car and then hand it off to the safety team…which would bolt airbags onto the …

Android
Android devices with pre-installed malware sold in developing markets

New low-end Android smartphone devices being sold to consumers in developing markets, many of whom are coming online for the first time, contain pre-installed malware, …

patch
July 2018 Patch Tuesday forecast: The fireworks and the finale

Patch management is kind of like fireworks around the fourth of July. Momentary excitement with lulls that repeat several times until the culminate in a finale! Well there are …

spotlight
Week in review: New LTE attacks, common API vulnerabilities, risk management trends

Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to …

Thermanator
New insider attack steals passwords by reading thermal energy from keyboards

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently …

mobile work
Four tips for keeping security worries away this summer

As the summer weather heats up, so does the desire to cut out of the office early and finish the workday from the park, a local pub patio or maybe the family cottage. Now is …

Money
Dramatic increase in cryptocurrency money laundering

Three times more cryptocurrency was stolen from exchanges in the first half of 2018 than in all of 2017, according to CipherTrace. These dirty funds all need to be …

IoT
Global revenue from the IoT and analytics for utilities market is expected to grow

The utilities industry is attempting to leverage a plethora of generating assets, transmission and distribution system equipment, and smart meters connected to the grid, …

find
Top six security and risk management trends

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this …

tools
How connected and secure is the modern workplace?

In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools