Please turn on your JavaScript for this page to function normally.
mobile
As attackers get more creative, mobile threats and attacks increase in both quantity and impact

It is no longer a matter of if or when an enterprise’s mobile endpoints will be compromised. They already are and most organizations have little to no knowledge or visibility …

ransomware
Ransomware attack leaves Johannesburg residents without electricity

A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …

wolf
Most SMBs have not identified and documented cybersecurity threats

A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, …

danger
Cyberthreats targeting municipalities are on the rise

Through the first half of 2019, a growing number of municipalities across the US were hit with crippling ransomware attacks, while several large companies disclosed data …

AWS
New open source solution reduces the risks associated with cloud deployments

An open source user computer environment (UCE) for the Amazon Cloud, called Galahad, has been launched by the University of Texas at San Antonio (UTSA). The technology will …

mobile apps
How mobile use cases in financial services are affecting security

Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “​Mobile Security in the Financial Services​,” includes analysis …

businessman
Experts weigh in on salient issues around emerging threats and security tech

RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …

question
Where are organizations stalling with cybersecurity best practices?

UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …

Fire
How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution …

Botnets shift from Windows towards Linux and IoT platforms

Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …

industrial
Organizations are advancing their efforts, investing in OT cybersecurity programs

ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing …

world biohazard
When it comes to email-based threats, Emotet dominates

Emotet displaced credential stealers, stand-alone downloaders and RATs and became the most prominent threat delivered via email, Proofpoint has shared. According to the …

Don't miss

Cybersecurity news