BalaBit updates Shell Control Box
BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …
Risk IT and services spending to reach $78.6 Billion in 2015
According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …
GPU-based malware is real, say developers of PoC rootkit and keylogger
“Two yet unfinished coding projects by a group of developers that call themselves Team Jellyfish have received unexpected attention due to an Ars Technica article …
Casino installs new POS equipment while investigating potential data breach
A few days after Las Vegas’ Hard Rock casino revealed that it has been hit by carders, another US casino has started an internal investigation aimed at finding out …
Millions of WordPress sites risk hijacking due to flaw in default theme
Guess what? Unless your site is hosted by one of 11 specific web hosts, it’s time to patch your WordPress installation again! Netsparker researchers have recently …
Researchers create searchable database of intelligence operators
The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights …
Workplace stress dramatically impacting IT professionals
High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …
Top cyber attack vectors for critical SAP systems
SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …
Criminal attacks in healthcare are up 125% since 2010
The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks—exposing millions of patients and their medical records, according …
Lenovo makes new critical security mistakes
After the Superfish debacle earlier this year, Lenovo’s security practices have once again been found lacking as researchers have discovered several vulnerabilities in …
Year-old flaw in popular WordPress plugin still actively exploited
Sucuri Security researchers have discovered yet another malicious campaign redirecting users to sites hosting exploits. As per usual, the attackers are mostly leveraging …
Netflix open sources FIDO, its automated incident response tool
Netflix has open sourced FIDO (Fully Integrated Defense Operation), a system for automatically analyzing security events and responding to security incidents that the company …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems