Malvertising campaigns increase 325 percent
Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks. Researchers found that malvertising …
Average financial services company uses 1,004 cloud applications
Skyhigh Networks analyzed cloud adoption in the financial services industry.The average financial services company uses 1,004 cloud services, which comes as a surprise to many …
Analyzing fraudulent and high-risk behaviour events
NuData Security announced new threat intelligence that provides insight into the latest trends in online fraud.Account takeover, in which fraudsters steal an established …
Unmanaged Apple devices are a liability for corporations
While people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities, according to a new survey by …
Cybercriminals are becoming more creative
The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …
The rise of mobile transactions and online lending fraud
During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. …
The rise of artificial intelligence technologies
The advance of artificial intelligence (AI) technologies has caught the attention of companies and institutions in a wide range of enterprise markets, and executives in almost …
Most security executives lack confidence in their security posture
A new Raytheon|Websense survey of security executives at large companies in the U.S. reveals that confidence in their enterprise security posture is lacking.According to the …
The unstoppable rise of DDoS attacks
For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …
How to sabotage DDoS-for-hire services?
We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them.What is less known is that a simple move like making PayPal seize the …
Five points of failure in recovering from an attack
An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection …
Privileged accounts are still easy to compromise
A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)