
Paying the ransom is not a good recovery strategy
Businesses are losing the battle when it comes to defending against ransomware attacks, according to a Veeam report, which found that 72% of organizations had partial or …

How confident are CISOs about their security posture?
Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 …

3 key elements to protect a Kubernetes cluster
Kubernetes changed how we structure, deploy, and run our applications and became a de-facto standard for running infrastructure at scale. With the rapid adoption of …

Ransomware still winning: Average ransom demand jumped by 45%
Group-IB unveils its guide to the evolution of threat number one “Ransomware Uncovered 2021/2022”. The findings of the second edition of the report indicate that the …

By streamlining compliance, companies can focus more on security
A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more …

Security has become more difficult, IT leaders say
Workspot announced a survey report conducted by Dimensional Research, which reveals that in the past year, due to remote work, 83% of IT leaders expanded or accelerated their …

Week in review: VMware critical fixes, Bluetooth LE flaw unlocks cars, Kali Linux 2022.2
Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, …

Two business-grade Netgear VPN routers have security vulnerabilities that can’t be fixed
Netgear has admitted that multiple security vulnerabilities in its business-grade BR200 and BR500 VPN routers can’t be fixed due to technical limitations outside of …

New infosec products of the week: May 20, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Deepfence, Kasten by Veeam, Qualys, Skybox Security, and Trusona. Qualys Custom …

How to ensure that the smart home doesn’t jeopardize data privacy?
The smart home has been much hyped for what feels a very long-time, but I think it is fair to say that the smart home era is now truly upon us. This status has been almost …

Email is the riskiest channel for data security
A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the …

Record level of bad bot traffic contributing to rise of online fraud
Bad bots, software applications that run automated tasks with malicious intent, accounted for a record-setting 27.7% of all global website traffic in 2021, up from 25.6% in …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)