
75% of cardholders prefer contactless cards to other payment methods
Based on responses from 1,000 U.S. cardholders who are familiar with contactless credit/debit card or “tap and pay” technology, a new Entrust Datacard survey reveals that 75% …

Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data
An unauthenticated file read vulnerability (CVE-2020-3452) affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software is being exploited by …

It’s time to tap the next generation of cyber defenders
As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …

Attackers have created a specialized economy around email account takeover
Barracuda released key findings about the ways cybercriminals are attacking and exploiting email accounts. The report reveals a specialized economy emerging around email …

DeimosC2: Open source tool to manage post-exploitation issues
TEAMARES launched DeimosC2, addressing the market need for a cross-compatible, open source Command and Control (C2) tool for managing compromised machines that includes mobile …

Integrated cloud-native security platforms can overcome limitations of traditional security products
To close security gaps caused by rapidly changing digital ecosystems, organizations must adopt an integrated cloud-native security platform that incorporates artificial …

Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …

Week in review: PoC for wormable SharePoint RCE released, how to select a DMARC solution
Here’s an overview of some of last week’s most interesting news and articles: Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into …

Ransomware recovery: Moving forward without backing up
Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …

Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices
A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …

The future of work: 74% believe they will emerge stronger
While much has been written about the immediate pandemic-related challenges, it’s important to apply the lessons learned as many prepare for the future of work. With …

27% of consumers hit with pandemic-themed phishing scams
Phishing is the top digital fraud scheme worldwide related to the COVID-19 pandemic, TransUnion reveals. Among consumers reporting being targeted with digital COVID-19 schemes …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise