Please turn on your JavaScript for this page to function normally.
Tools
A look at modern adversary behavior and the usage of open source tools in the enterprise

Leszek Miś is the founder of Defensive Security, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online …

router
New wave of attacks aiming to rope home routers into IoT botnets

A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. The report urges users to take …

lock
Most global brands fail to implement security controls to prevent data leakage and theft

The global pandemic has seen the web take center stage. Banking, retail and other industries have seen large spikes in web traffic, and this trend is expected to become …

DNS
The effectiveness of using DNS as a foundational element in future network security best practices

As cyberattacks escalate, Infoblox and Forrester Consulting investigated how security and risk (S&R) teams are using their DNS investments. The 203 respondents to the …

Woman working on laptop
Tech sector job interviews test performance anxiety rather than competence at coding

A study from North Carolina State University and Microsoft finds that the technical interviews currently used in hiring for many software engineering positions test whether a …

vote
Cybersecurity concerns front and center as online voting expected to shape future elections

Online voting is likely to shape future election cycles, according to a study from OneLogin. 59% of respondents expect online voting will become a reality within five years. …

Google Chrome
How secure is your web browser?

NSS Labs released the results of its web browser security test after testing Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, for phishing protection and malware …

target
20% of credential stuffing attacks target media companies

The media industry suffered 17 billion credential stuffing attacks between January 2018 and December 2019, according to a report from Akamai. The apparent fourfold increase in …

bomb
New threat environment elements and global attack trends

There has been an increase in both cyberattack volume and breaches during the past 12 months in the U.S. This has prompted increased investment in cyber defense, with U.S. …

fake Cisco device
Investigation highlights the dangers of using counterfeit Cisco switches

An investigation, which concluded that counterfeit network switches were designed to bypass processes that authenticate system components, illustrates the security challenges …

email
Email impersonations becoming pervasive, preying on a distracted and dispersed workforce

Impersonations have become pervasive, and are by far the most prevalent type of email-based attack ending up in business’s inboxes. This is according to a survey report by …

robot
Businesses express concerns around ethical risks for their AI initiatives

Businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers, according to Deloitte. …

Don't miss

Cybersecurity news