Please turn on your JavaScript for this page to function normally.
ransomware
Three places for early warning of ransomware and breaches that aren’t the dark web

For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. …

ERP
ERP security: Dispelling common misconceptions

Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to …

SSD
PinK: A new way of implementing a key-value store in SSDs

As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …

lock
New attack vectors make securing virtual companies even more challenging

As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers—and new challenges for network administrators have been …

IoT
The evolution of IoT asset tracking devices

Asset tracking is one of the highest growth application segments for the Internet of Things (IoT). According to a report by ABI Research, asset tracking device shipments will …

SourMint
Malicious iOS SDK breaches user privacy for millions

Researchers discovered a malicious functionality within the iOS MintegralAdSDK (aka SourMint), distributed by Chinese company Mintegral. Functional flow of a user ad-click …

secure
Protect your organization in the age of Magecart

The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a …

connection
COVID-19 impact on digital transformation, cloud and security strategies

Half a year into the shutdown, companies are still playing catch up to optimize their remote work experience, according to Infoblox. Survey findings are based on 1,077 …

cloud
How can companies avoid the risks of unexpected expenses related to cloud migration?

As companies shift to remote work and move business operations online because of the spread of COVID-19, they are increasingly relying on cloud services. Unexpected expenses …

server
Researchers develop a process to categorize massive datasets, making data more accessible

A computer science professor at The University of Texas at Arlington is working with researchers to develop a process by which data points in multiple graph layers of massive …

Kali Linux
Week in review: Kali Linux 2020.3, mobile security threats, ISO certs at risk of lapsing

Here’s an overview of some of last week’s most interesting news and articles: Updated cryptojacking worm steals AWS credentials A malicious cryptocurrency miner …

ATM
ATM makers fix flaws allowing illegal cash withdrawals

ATM manufacturers Diebold Nixdorf and NCR have fixed a number of software vulnerabilities that allowed attackers to execute arbitrary code with or without SYSTEM privileges, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools