The 15 most exploited vulnerabilities in 2021
In 2021, threat actors aggressively exploited newly disclosed critical software vulnerabilities to hit a broad set of targets worldwide, says the latest advisory published by …
Top 5 security analytics to measure
You don’t need a Ph.D. in cybersecurity to recognize the importance of security analytics. Security analytics uses data analysis – often aided by machine learning – to …
Ransomware is up and victims are paying
Sophos released a survey and review of real-world ransomware experiences in a report which shows that 66% of organizations surveyed were hit with ransomware in 2021, up from …
Cybercriminals deliver IRS tax scams and phishing campaigns by mimicking government vendors
Cybercriminals are leveraging advanced tactics in their phishing-kits granting them a high delivery success rate of spoofed e-mails which contain malicious attachments right …
Post-pandemic priorities for security leaders
Info-Tech Research Group has published its annual report on the priorities for security leaders. The report combines insights from the 2022 security priorities survey and …
Are businesses ready to implement cloud-native development?
OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark …
Nimbuspwn bugs allow attackers to gain root privileges on some Linux machines (CVE-2022-29799, CVE-2022-29800)
Microsoft has unearthed two security vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon that may be exploited by attackers to gain root on many …
The hierarchy of cybersecurity needs: Why EASM is essential to any zero-trust architecture
Zero trust was born out of the critical need to modernize outdated IT architecture, which assumes that all assets within an organization – and attached to it – should be …
Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK
Victims lost $6.9 billion to cybercrime in 2021, according to FBI’s Internet Crime Complaint Center. To take a bite out of that number, the Center for Internet Security …
Multi-vector DDoS attacks on the rise, attackers indiscriminate and persistent
Comcast Business published results from a report which provides an overview of the distributed denial of service (DDoS) attack landscape, trends experienced by its customers …
Siloed technology management increases operational blind spots and cyber risk
Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While …
eBook: A new breed of endpoint protection
Our workforce has rapidly evolved, with millions of employees permanently working from home or transitioning to a hybrid setting. Unfortunately for cybersecurity, hackers …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)