
Malicious activity surges coincide with geopolitical events
Comodo released its Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of …

Dangerous CredSSP flaw opens door into corporate servers
A critical vulnerability in the Credential Security Support Provider protocol (CredSSP), introduced in Windows Vista and used in all Windows versions since then, can be …

Global business spend on cybersecurity to grow 33% over the next 4 years
New data from Juniper Research has found that global business spend on cybersecurity solutions will grow by 33% over the next 4 years, reaching $134 billion annually by 2022. …

Researchers find critical flaws in SecurEnvoy SecurMail, patch now!
If you’re a user of SecurEnvoy SecurMail and you haven’t yet implemented the latest patch, do so now – or risk getting your encrypted emails read by …

Healthcare industry: Attacks outpacing investments in personnel, education and resources
Recognizing that healthcare organizations are facing constant cyber attacks, the 2018 Impact of Cyber Insecurity on Healthcare Organizations study examines the myriad of …

Record surges in healthcare attacks, fileless malware, cryptocurrency mining
During Q4 2017, McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 …

Binance offers $250,000 for info about hackers who targeted its users
Binance, the popular Chinese cryptocurrency exchange focusing on crypto-to-crypto trading, has put a $250,000 bounty on the heads of the attackers who tried to pull off a …

Global SOC maturity improves, yet some still operate with serious gaps in security
Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …

Organizations are not doing enough to protect data privacy
In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data …

Week in review: New LTE attacks, Android P security, backdooring connected cars
Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …

Robots hijacked by ransomware may soon become a reality
How soon will we see our home, office or industrial robots being hijacked and held ransom by attackers? If they dedicate their efforts to research, that day may come sooner …

Vulnerable Apache Solr, Redis, Windows servers hit with cryptominers
Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers. Apache Solr servers under attack SANS ISC handler Renato …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform