Please turn on your JavaScript for this page to function normally.
target
20% of credential stuffing attacks target media companies

The media industry suffered 17 billion credential stuffing attacks between January 2018 and December 2019, according to a report from Akamai. The apparent fourfold increase in …

email
Email impersonations becoming pervasive, preying on a distracted and dispersed workforce

Impersonations have become pervasive, and are by far the most prevalent type of email-based attack ending up in business’s inboxes. This is according to a survey report by …

DNS
Is DNS a vital component of your security strategy?

Security and risk (S&R) teams often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware, an …

attacks
2020: The year of increased attack sophistication

There was an increase in both cyberattack volume and breaches during the past 12 months in the U.S. This has prompted increased investment in cyber defense, with U.S. …

Biohazard
Ransomware, then and now: The change in data theft behavior

The rising number of people working from home have left more businesses at risk from ransomware than ever before. Gaps in network security, shadow IT and a greater reliance on …

hunt
Cyberwarfare: The changing role of force

Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a …

laptop
In the age of disruption, comprehensive network visibility is key

IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …

MongoDB
MongoDB is subject to continual attacks when exposed to the internet

On average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database …

shield
Better cybersecurity hinges on understanding actual risks and addressing the right problems

SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …

identity
New technique keeps your online photos safe from facial recognition algorithms

In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …

ransomware
Ransomware attacks are increasing, do you have an emergency plan in place?

39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …

DDoS
Duration of application DDoS attacks increasing, some go on for days

There were seven major application DDoS attacks over the previous month — two of which lasted 5-6 days, Imperva reveals. Additionally, the team found that 47% of account …

Don't miss

Cybersecurity news