Presidential primary election apps may expose sensitive data
Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, …
Attackers opt for discreet methods to spy inside the network
For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …
Most organizations still lack visibility into database assets
Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …
Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …
The future of ICS security depends on OT-centric security solutions
New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …
Increase in credit card leaks with high profile apps and sites
A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …
A global data analysis of hostile activity
Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …
Ransomware attacks escalate, companies largely unprepared
Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …
Exposing the Cybercrime as a Business model
Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …
Employees risk corporate security by accessing pirated content
6 in 10 Brits who use personal devices for work also use the same device for streaming or downloading pirated content. Whilst the research, conducted by OnePulse, found that …
The rise of threat hunting
85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …
Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down