
The evolution of data breach prevention practices
Despite the potential costs, legal consequences and other negative outcomes of data breaches, they continue to happen. A new SANS Institute survey looks at the preventive …

German Federal Intelligence Service violates laws, dodges supervision
The German Federal Intelligence Service (BND) has been illegally collecting data through mass surveillance tools, storing it in databases that should not exist, and has …

Top network security and data privacy concerns among businesses
With network security top of mind, businesses are nearly two times more concerned with losing private data (47 percent) than hackers disrupting their systems (26 percent), …

Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion
Micro Focus announced today its intent to merge with HPE’s Software Business Segment in a transaction valued at approximately $8.8 billion. The merger is subject to …

WordPress 4.6.1 upgrades security, fixes 15 bugs
WordPress 4.6.1 is now available. This is a security release for all previous versions and all users are strongly encouraged to update their sites immediately. The two …

Yelp makes its bug bounty program public
After two years of keeping their bug bounty program private and relatively secret, Yelp is opening it up and has invited bug hunters to probe its sites, apps, and …

Mirai Linux Trojan corrals IoT devices into DDoS botnets
Mirai, a newly discovered and still poorly detected piece of Linux malware, is being used to rope IoT devices into DDoS botnets. Researchers from MalwareMustDie have recently …

Gugi banking Trojan outsmarts Android 6 security
A modification of the Gugi banking Trojan that can bypass Android 6 security features designed to block phishing and ransomware attacks. The modified Trojan forces users into …

ISPs treat cyber security as a top priority
Better law enforcement training and coordination of cyber security and support for a government-backed awareness campaign are two key findings of an ISP survey by the Internet …

Iovation acquires LaunchKey, shows the future of authentication
Iovation, a provider of device-based solutions for authentication and fraud prevention, announced the acquisition of multifactor authentication company LaunchKey. The move …

Nearly 800,000 Brazzers users’ credentials exposed
Account login credentials of nearly 800,000 Brazzers porn site users have been stolen in 2012, but the breach has only now come to light, after the data dump was obtained by …

Too many Cisco ASA boxes still open to an EXTRABACON attack
Among the Equation Group exploits leaked by the Shadow Brokers, the one named EXTRABACON that targets Cisco ASA devices got the most attention from security researchers and …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)