Please turn on your JavaScript for this page to function normally.
malware
New cyberespionage campaign targeting ISPs, research entities

ESET Research discovered a still-ongoing cyberespionage campaign using a previously undocumented Korplug variant by the Mustang Panda APT group. The current campaign exploits …

Android explode
Malware resets Android devices after performing fraudulent wire transfers

If your Android phone initiates a factory reset out of the blue, there’s a chance it has been infected with the BRATA banking malware and you’ve just been ripped …

identity
Digital IDs under attack: How to tackle the threat?

Digital identification is the focus of two reports by the European Union Agency for Cybersecurity (ENISA): an analysis of self-sovereign identity (SSI) and a study of major …

The security of devices held by public sector employees

Apricorn announced new findings from Freedom of Information (FoI) requests submitted to 16 government departments into the security of devices held by public sector employees. …

check
IR and SimEx: Can and should they be standardized?

The National Cyber Security Centre (NCSC) intends to launch a new assurance scheme for incident response (IR) and simulated exercises (SimEx) in Q2 2022, which could become a …

lock
Exploring the current state of cybersecurity resilience

Cyberattacks surged over fivefold during the height of the pandemic, with large U.K. organisations each facing an average of 885 attempted cyberattacks in 2020 – up from 156 …

healthcare
How to strengthen incident response in the health sector

The European Union Agency for Cybersecurity issued an analysis of the current state of development of sectoral CSIRT capabilities in the health sector since the implementation …

EU
EU Commission takes on challenge to improve the cybersecurity of wireless devices

The European Commission has taken action to improve the cybersecurity of wireless devices available on the European market. As mobile phones, smart watches, fitness trackers …

SolarWinds hackers are going after cloud, managed and IT service providers

Nobelium, the advanced, persistent threat (APT) actor behind the 2020 SolarWinds supply chain attack that served as a springboard for breaching a variety of high-level …

Renata Mekovec
ISC2 goes to school: CISSP preparation and training as part of a specialist study

In this interview with Help Net Security, Renata Mekovec, Associate Professor and Head of the postgraduate specialist study Information Systems Security Management and …

vault
Enterprises looking to cybersecurity providers to help protect IT systems

As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …

question
Engaging with governments is a data security priority

Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial …

Don't miss

Cybersecurity news