Please turn on your JavaScript for this page to function normally.
SAP
36000 SAP systems exposed online, most open to attacks

ERPScan released the first comprehensive SAP Cybersecurity Threat Report, which covers three main angles: Product Security, Implementation Security, and Security Awareness. …

Armor
Armor Anywhere: Managed security for any cloud

As growing businesses increasingly rely on public, private and hybrid cloud platforms in addition to internal infrastructures, at Armor is launching Armor Anywhere to keep …

criminal
Interpol arrests Nigerian scam mastermind who stole $60 million

The head of an international criminal network behind thousands of online frauds has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial …

danger
The growing threat of ransomware: Lucrative, low-risk and easy to use

Recent headlines are testament to the growing popularity of ransomware attacks on businesses and consumers alike. In January, for example, Lincolnshire County Council saw its …

Needle
Needle iOS security testing tool to be unveiled at Black Hat Arsenal

In a session at Black Hat USA 2016 on Wednesday, Marco Lancini, Security Consultant at MWR InfoSecurity, will demonstrate publicly for the first time a new iOS security …

ThreatPath
Visibility and assessment of vulnerable attack paths

Attivo Networks announced that its ThreatMatrix Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack …

success
Week in review: Snooping Tor nodes, Wi-Fi keyboards open to keystroke sniffing

Here’s an overview of some of last week’s most interesting news, reviews and articles: Industry collaborates on automotive cybersecurity best practices More than …

Privacy Shield
European privacy advisor wants encryption without backdoors

“The confidentiality of online communications by individuals and businesses is essential for the functioning of modern societies and economies. The EU rules designed to …

world
Business and IT decision makers are aligned on key IT trends

Business decision makers’ (BDMs) and IT decision makers’ (ITDMs) understanding of current IT trends are much closer than they are generally perceived to be, according to a new …

Abstract
IoT: A hacker’s dream come true?

There’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of …

cloud
Virtually all business cloud apps lack enterprise grade security

Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 …

key
Businesses need to protect data, not just devices

As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. More companies are moving away from device-centric, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools