Microsoft offers rewards for security bugs in Microsoft Teams
Microsoft is starting a new Applications Bounty Program, and the first application that they want researchers to find bugs in is Microsoft Teams, its popular business …
Challenges and benefits of using threat data feeds
Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …
Using memory encryption in web applications to help reduce the risk of Spectre attacks
There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …
Distributed and remote work creating a perfect storm for network security teams
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …
Continued WAN and application growth resulting in network complexity
The WAN continues to extend its growth, with the number of enterprises connecting to over 100 inter-regional sites growing by 50%, from 19% in 2020 to 28% in 2021, according …
61% of businesses say competitive intelligence has made a direct impact on revenue
61% of businesses say competitive intelligence has made a direct impact on revenue — a 17% increase over last year’s figure of 52%, a Crayon report reveals. Competitive …
Worldwide Wi-Fi market to reach $25.244 million by 2026
The global Wi-Fi market is projected to grow from $9.437 million in 2020 to reach $25.244 million by 2026, at a Compound Annual Growth Rate (CAGR) of 17.8% during the forecast …
5G network slicing vulnerability leaves enterprises exposed to cyberattacks
AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …
(IN)SECURE Magazine issue 68 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 68 has been released today. It’s a free …
Hidden areas of security and the future of hybrid working
The pandemic has changed how many companies operate in a short period of time. Over the last year we’ve witnessed most organizations with office-based workforces having to …
What businesses need to know to evaluate partner cyber resilience
Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …
Total combined fraud losses climbed to $56 billion in 2020
While total combined fraud losses climbed to $56 billion in 2020, identity fraud scams accounted for $43 billion of that cost. Traditional identity fraud losses totaled $13 …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform