Please turn on your JavaScript for this page to function normally.
fractal generic center evolution spread
Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers

Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of …

CIA
How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via …

password
Password Reset MITM: Exposing the need for better security choices

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

BEC scams
Internet crime: The continuing rise of the BEC scam

Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the …

network
New infosec products of the week​: June 23, 2017

API Behavioral Security: Detecting and blocking attacks targeting API infrastructures Elastic Beam unveiled its flagship solution, API Behavioral Security (ABS), the first …

cloud proliferation
Organizations still unclear on cloud security responsibility

Vanson Bourne surveyed 1,300 IT decision makers from organizations using public cloud Infrastructure as a Service (IaaS) from the Americas, Europe, Middle East and Africa …

Microsoft Edge
Microsoft extends the Microsoft Edge Bounty Program

Initially time-bound, the Microsoft Edge Bounty Program has now been turned into one that will run indefinitely, Microsoft has announced. The past and present of the Microsoft …

lock
Businesses finally realize that cyber defenses must evolve

Cybersecurity is finally getting the attention it deserves – it is only regrettable that this good news is the result of bad news: more numerous, complex, and damaging …

connected house
Trusted identities bridge gap between connected workers and smart buildings

Trusted identities can serve as the backbone for smart buildings and today’s connected workforce, according to a new study conducted by IFSEC Global. The study focused on how …

structure
Forget about the malware, go after attackers’ tactics, techniques and procedures

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …

Businessman juggling
When it comes to cybersecurity, businesses remain overconfident and vulnerable

Consumer products companies, retailers and restaurant businesses may be operating with a false sense of security, according to a new Deloitte study. The study captures input …

laptop crime
Email scammers swindle US State Supreme Court judge out of $1 milion

If often happens to less prominent individuals, but this time it happened to a US State Supreme Court judge: scammers have managed trick her into wiring the money meant for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools