Threats on government networks remain undetected for 16 days
Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …
High volume DDoS attacks still persistent
Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …
Researchers mount cyber attacks against surgery robot
A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely …
Police dismantle gang of online fraudsters and romance scammers
The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were …
Email delivery service SendGrid confirms data breach
Sendgrid, the email delivery and management service that counts among its clients companies like Pinterest, Airbnb and Uber, has admitted that they have been …
Big Data and analytics are changing the cybersecurity landscape
Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all …
Security still the top issue preventing payments investment
A new payments survey of more than 1,100 executives representing banks, retailers and billing organizations across the world revealed that although 80 percent of them …
Only 57% of critical IT infrastructure issues are detected before business impact
Organizations large and small are struggling to meet their Key Performance Indicator (KPI) goals and prevent IT issues before they adversely impact the business, according to …
A closer look at LepideAuditor for File Server
Organizations host file servers to store critical data to and valuable information about its business, customers, and employees. Access to file servers is authorized only for …
There’s now a decryption tool for TeslaCrypt ransomware
“Here’s some very good news for victims of the TeslaCrypt ransomware: Cisco researchers have created a tool for them to decrypt the files themselves and avoid …
Banking Trojan delivered to companies via macro-based malware
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …
WordPress vulnerable to yet another, still to be patched XSS flaw
The latest WordPress version (4.2, released on Thursday) and several earlier ones are vulnerable to a stored cross-site scripting (XSS) vulnerability that can be exploited to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)