Please turn on your JavaScript for this page to function normally.
person
Credential exposure trends: You need a better password

SpyCloud researchers recovered more than 4.6 billion pieces of personally identifiable information and nearly 1.5 billion stolen account credentials from 854 breach sources in …

stock price
Cybercriminals increasingly impersonate business-related apps

Cybercriminals have wasted little time in capitalizing on the vulnerabilities that come with remote work, and their attacks have been highly targeted, with a focus on …

cloud
To support a growing remote workforce, the public sector turned to the cloud

Nutanix announced the global public sector industry findings of its report, measuring organizations’ plans for adopting a private, hybrid and public cloud. The findings point …

Power
In the digital economy, computing power defines productivity

Global digital transformation has entered a phase marked by exponential growth in innovation, with the size of the digital economy projected to continue on an upward trend. As …

building
Security starts with architecture

The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s …

cloud
32% of enterprises experienced unauthorized access to cloud resources

A new report conducted by Dimensional Research revealed that 32% of enterprises experienced unauthorized access to cloud resources, and another 19% were unaware if …

dark
Cybercriminals innovate to find vulnerabilities that can be monetized

The global pandemic had a dramatic influence on the cybersecurity landscape in 2020. Cymulate, released its report on the 2020 security landscape and its impact on security …

account
Businesses trust their remote employees are sufficiently skilled to mitigate cybersecurity risks

80% of businesses worldwide are confident their remote employees, specifically those working with finance software or participating in official company transactions, have the …

fake news
The economics behind global disinformation engines and strategies for mitigation

Online propaganda is a rapidly growing problem, leaving chaos, mistrust, and revolutions rumblings in its wake. Broad propaganda penetration is achieved by following a …

linux tux
Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Security researcher Alexander Popov has discovered and fixed five similar issues in the virtual socket implementation of the Linux kernel. The vulnerabilities could be …

Microsoft Exchange
Exchange Servers targeted via zero-day exploits, have yours been hit?

Microsoft has released out-of-band security updates for seven bugs affecting Microsoft Exchange Servers, four of which are zero-day vulnerabilities being exploited by …

bot
Proliferation of sneakerbots across industries: The long tail of DIY bot operators

Many people’s first exposure to bots came from so-called sneakerbots. Sneakerbots are used to scan websites for inventory and automatically complete the checkout process. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools