
Playbook: Prepare your business for DDoS attacks
Like any business initiative, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as possible. …

Application security market will grow to $6.77 billion by 2021
According to a new market research report by MarketsandMarkets, the global application security market size is estimated to grow from USD 2.24 Billion in 2016 to USD 6.77 …

Researcher demonstrates website’s lax security, gets arrested
David Levin, CTO of pentesting company Vanguard Cybersecurity, has made a critical mistake while testing the security of the Lee County (Florida) elections website: he …

Liberty Reserve founder sentenced to 20 years for money laundering
Arthur Budovsky was sentenced in the Southern District of New York to 20 years imprisonment for running a massive money laundering enterprise through his company Liberty …

Fraudsters loot W-2 data stored by Equifax
Equifax, one of the big-three US credit bureaus, has been targeted by fraudsters that search for W-2 data and use it for claiming fraudulent tax returns. But the company …

Exploit kits are the greatest danger for Windows users
Exploit kits are how most malware gets on victims’ computers and, according to Microsoft, encounters with exploit kits increased by more than a third from 3Q15 to 4Q15. …

Internet of Fail: How modern devices expose our lives
Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

New ransomware modifications increase 14%
Kaspersky Lab detected 2,896 new ransomware modifications during the first quarter, which is an increase of 14 percent on the previous quarter. In addition, the number of …

How small businesses approach risk mitigation and response
CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …

Week in review: ImageMagick 0day, and why you need a Security Evangelist
Here’s an overview of some of last week’s most interesting news, reviews and articles: Web servers and sites under attack via ImageMagick zero-day flaw The flaw …
Android Trojan pesters victims, won’t take no for an answer
If an app won’t stop badgering you to give it administrator rights to your Android device, chances are you have picked up malware somewhere. Malware peddlers are …

Companies are hungry for professional open source talent
Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations