Companies stay vulnerable to web attacks for far too long
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …
Company compiles massive marketing database by scraping data dumps
SalesMaple, a recently founded data analytics startup headed by PwnedList founder Steve Thomas, has made available a free database of some 30 million business contacts, which …
Personal info of 1.1M customers stolen in CareFirst breach
CareFirst, a Blue Cross Blue Shield plan, has announced that they have suffered a breach in which the attackers gained access to one of their databases.“Evidence …
The rise in false fraud alerts
68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …
A first aid kit for ransomware infections
“You’ve been hit by ransomware and you don’t know what to do? Jada Cyrus has assembled a helpful “Ransomware Removal Kit” which contains …
Google patches Android Chrome address bar spoofing bug
The existence of another address bar spoofing bug has been revealed, and this one affects the Android Chrome browser.“Due to a problem in handling 204 “No …
Newly disclosed Logjam bug might be how the NSA broke VPNs
Another vulnerability courtesy of 1990s-era US export restrictions on cryptography has been discovered, and researchers believe it might be how the NSA managed to regularly …
Bug in NetUSB code opens networking devices to remote code execution
Researchers from SEC Consult have published details of a critical kernel stack buffer overflow vulnerability in NetUSB, a software component that provides “USB over …
DDoS attacks double, old web application attack vectors still active
Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.A surge in DDoS attack …
Hackers breached subsea cable operator Pacnet’s corporate IT network
Global telecommunications service provider and fibre optic subsea cable operator Pacnet has suffered a breach: unknown hackers have gained access to its corporate IT network …
Can you afford to wait 197 days to detect a threat?
Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …
South Korean minors to be monitored via smartphone spying apps
The Korea Communications Commission, South Korea’s media regulation agency modeled after US’ FCC, has made it mandatory for telecoms and parents to install a …
Featured news
Resources
Don't miss
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems
- Meta open-sources AI tool to automatically classify sensitive documents