Please turn on your JavaScript for this page to function normally.
arrow
Week in review: Mac malware-as-a-Service, CIA hacking routers, top tech for infosec

Here’s an overview of some of last week’s most interesting news and articles: End-to-end email encryption with no central point of attack A seamless, easy-to-use, …

extortion
Cyber extortionists target North American companies

A group of financially motivated hackers is targeting networks and systems of North American companies, threatening to leak the stolen information and cripple the company by …

world intelligence
BAE Systems sold cyber-surveillance tools to autocratic regimes

British multinational BAE Systems has sold sophisticated surveillance technology to many repressive governments in the Middle East and Africa, an investigation by BBC Arabic …

CIA
How the CIA hacked wireless home routers

For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

tech
New infosec products of the week​: June 16, 2017

Uplevel Systems unveils managed VPN service infrastructure Uplevel Systems has added VPN capabilities to its hybrid managed service platform to help providers differentiate …

artificial intelligence
Perception and reality: The role of AI and automated cyber defenses

Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

skull
Most corporate finance leaders expect to change fraud-fighting strategies

Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

biohazard
US restaurants targeted with fileless malware

Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign …

attack
Whitepaper: Confronting advanced threats as an organization

This whitepaper is no longer available. Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of …

quantum
End-to-end email encryption with no central point of attack

A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based …

puzzle
DevSecOps: Build a bridge between fast and secure software development

Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

fake news
Fake news services and tools proliferate on online markets

Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread and reach its …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools