
Google Groups misconfiguration leads to sensitive data leaks
If your employees are using Google Groups to discuss issues and ideas, you might want to check whether the sharing setting for these groups is set to “Private”. …

UK govt urges teenagers to apply for cyber security training programme
UK teenagers are being encouraged to register in a cyber security training programme rolled out to help the nation address the risk of a future skills shortage. The Department …

Custom code accounts for 93% of application vulnerabilities
Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …

Testing the security of connected cars and IoT devices
IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …

Manage SSL/TLS certificates across IT environments with Qualys CertView
Qualys announced CertView, a new app framework in the Qualys Cloud Platform that enables customers to discover, assess and manage SSL/TLS certificates on a global scale, …

Google Play Protect scans for malicious apps
By now, many Android users that have the Google Play Store app on their devices should be able to find Google Play Protect in it. What is Google Play Protect? Google Play …

Addressing the deficit in cyber security workforce and national policy
Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But …

As GDPR approaches, retail data breaches remain unacceptably high
Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …

IT operators see promise in DevOps and new tech
A new Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation …

Week in review: macOS security, Segway vulns, and the SOC of the future
Here’s an overview of some of last week’s most interesting news and articles: The future of macOS security: Baked-in protection and third-party tools Anyone in the …

Qualys at Black Hat USA 2017: Best practices and case study presentations
There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and …

Surprisingly stealthy botnet has been targeting users for years
ESET researchers have unearthed a botnet of some 500,000 infected machines engaged mostly in ad-related fraud by using malicious Chrome extensions, but also Facebook fraud and …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware