Please turn on your JavaScript for this page to function normally.
target
List of IT assets an attacker is most likely to target for exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …

bomb
Is the government’s response to cybersecurity threats enough for your organization?

With this year’s attacks against Colonial Pipeline and Kaseya, ransomware and its impact on infrastructure have been pushed to the forefront of American political …

ransomware
Ransomware attacks preparedness lagging, despite organizations being aware of the risks

Hornetsecurity released the results of a global study of IT professionals on their preparedness for ransomware attacks. Survey data showed that although companies are …

drown
Cybersecurity shortcomings exposed by the pandemic

SecureAge announced the release of its study which polled 200 employers and 400 employees from around the UK business world during Q3 2021, and examined key cybersecurity …

code
Strengthening firmware security with hardware RoT

Hackers are growing smarter and more sophisticated in their attempts to avoid detection. With IT security and visibility efforts still largely focused higher in the stack at …

ransomware
REvil/Sodinokibi accounting for 73% of ransomware detections in Q2 2021

McAfee released a report which examines cybercriminal activity related to ransomware and cloud threats in the second quarter of 2021. With the shift to a more flexible …

James Carder
Critical infrastructure IoT security: Going back to basics

In this interview with Help Net Security, James Carder, CSO & VP of Labs at LogRhythm, talks about critical infrastructure IoT security, the vulnerabilities that are …

Active Directory
Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the …

Large ransom demands and password-guessing attacks escalate

ESET released a report that summarizes key statistics from its detection systems and highlights notable examples of its cybersecurity research. The latest issue of the report …

collaboration
How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …

bomb
Nation-state attacks fears grow, execs don’t trust governments to protect them from cyber threats

Arctic Wolf published findings from a recent global survey of over 1,400 IT decision-makers at enterprise organizations. After a year of high-profile cyberattacks, the survey …

C-level execs confident in their software supply chain security, but challenges remain

A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …

Don't miss

Cybersecurity news