
Government IT pros overconfident in insider threat detection
An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place …

Worldwide cloud IT infrastructure revenue grows to $6.6 billion
Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 3.9% year over year to …

New Mac OS X backdoor disguised as document converter app
Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …

EU to invest €450 million in cybersecurity research
The European Commission launched a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. The EU cybersecurity …

Faraday: Collaborative pen test and vulnerability management platform
Faraday is an integrated multi-user penetration testing environment that maps and leverages all the knowledge you generate in real time. It gives CISOs a better overview of …

Industrialisation of cybercrime is disrupting digital enterprises
Only a fifth of IT decision makers in large multinational corporations are confident that their organisation is fully prepared against the threat of cybercriminals. The vast …

Risk analytics market to experience serious growth
The risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to …

Exploit for GNU wget RCE flaw revealed
Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …

Netherlands, South Korea get nationwide IoT network
In the space of a week, the Netherlands and South Korea got their own, nationwide IoT network. Late last week, Dutch telecom KPN announced that its LoRa (Long Range) network …

TP-LINK loses control of two device configuration domains
Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and …

Locky ransomware variant Zepto hits users via email
A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …

Half of SMBs experienced a breach in the past year
More than 50% of SMBs have been breached in the last 12 months, according to a North American study by the the Ponemon Institute. No business is too small to evade a cyber …