Please turn on your JavaScript for this page to function normally.
Facepalm
Unsecured databases continue leaking millions of records

UK ISP and telecom provider Virgin Media has confirmed on Thursday that one of its unsecured marketing databases had been accessed by on at least one occasion without …

face
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains

Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …

person
Damaging insider threats rise to new highs in the past year

70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …

server
As cyber attacks increase, the cloud-based database security market grows

The cloud-based database security market is expected to register a CAGR of 19.5% over the forecast period 2019-2024, according to ResearchAndMarkets. With the increasing …

storm
Magecart compromised 17,000+ sites through unsecured Amazon S3 buckets

We often hear about misconfigured Amazon S3 buckets exposing sensitive business and customer data, but there’s another present danger: Magecart attackers have been …

cloud
Prioritizing security efforts is key to data security in the cloud

32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …

cloud
Over reliance on public cloud vendor security puts data and companies at risk of breach

As global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one …

Microsoft OneDrive
Microsoft OneDrive users get an even more secure Personal Vault

Microsoft has announced that, by the end of the year, all users of its OneDrive cloud storage service will get a Personal Vault, which will provide added protection for …

cloud
How cloud storage providers can preempt cyber attacks with business continuity

Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …

cloud proliferation
Vulnerable cloud infrastructure experiencing increasing attacks

Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …

AWS
New security feature to prevent Amazon S3 bucket misconfiguration and data leaks

Hardly a week goes by that we don’t hear about an organization leaving sensitive data exposed on the Internet because they failed to properly configure their Amazon S3 …

cloud
Solving the cloud infrastructure misconfiguration problem

Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents …

Don't miss

Cybersecurity news