Cloud computing in critical information infrastructure protection
ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …
Phishing campaigns run rampant on social networks
In January, GFI threat researchers identified a number of social network-based cybercrime attacks, including phishing messages on Twitter and Facebook, as well as malicious …
11 arrested in takedown of prolific ransomware gang
The Spanish Police, working closely with the European Cybercrime Centre (EC3) at Europol, have dismantled the largest and most complex cybercrime network dedicated to …
Infosec pros don’t trust their own networks
A SafeNet survey of 230 United States security professionals, revealed that, despite continued investments in network perimeter technologies, respondents are not confident …
Qualys and iViZ partner on cloud-based web application security
Qualys announced its partnership with iViZ to help companies ensure and validate the security of their web applications and web sites. The partnership combines the automated …
Do APTs present a credible threat to national security?
A global cybersecurity survey of more than 1,500 security professionals found that more than one in five respondents said their enterprise has experienced an advanced …
SmartShare: Free tool for secure social sharing
Veracode released SmartShare, a free tool designed to offer developers, bloggers and marketers a more secure method of on-site bookmark sharing. With more online content being …
CA streamlines identity and access management
CA announced its CA CloudMinder identity and access management (IAM) service solution. CA CloudMinder provides enterprise-grade IAM for both cloud-based or on-premise …
TDoS-as-a-service ads pop up on publicly accessible forums
In the past, aspiring cybercriminals with no coding knowledge had to find a way into invite-only underground forums or had to spend hours in chat rooms to gain the trust of …
Cryptome site, Twitter and email account hacked again
Cryptome, the well-known online repository of documents concerning cryptography, freedom of speech, spying, and surveillance, has been hacked again on Monday night, says the …
Hackers pollute legitimate JavaScript code to spread malware
Most hackers have stopped creating malicious sites long ago and have reverted to hacking legitimate ones and booby-trapping them with exploit kits, malware or malicious …
Adobe Reader zero-day exploit spotted in the wild
Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader. “Upon successful exploitation, it …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform