cybersecurity

Confidence wavers in face of evolving cybersecurity threats
Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

How criminals abuse IDNs to conduct malicious activities
New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …

Bot-driven credential abuse, DDoS attacks continue to rise
Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …

Managing and maintaining security in the enterprise
In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …

Has your security evolved to counter Ocean’s Eleven of threat scenarios?
In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a …

Why cybercriminals are turning to cryptojacking for easy money
The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017. …

Banking Trojans and cryptojacking on the rise
A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth …

Unrestricted access to systems and files exposes organizations to cybercrime
UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …

Could an Equifax-sized data breach happen again?
Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), …

Endpoint security automation a top priority for IT pros
A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around …

Execs don’t believe their companies learn the right lessons in cybersecurity
A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly …

Inferring Internet security posture by country through port scanning
In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of …
Featured news
Resources
Don't miss
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group