
IRS scams during tax season target unsuspecting consumers
Scam robocalls and phishing emails disguised as banks continue to trick consumers to put their personal information at risk, and tax season is no exception. Increase in …

Multi-cloud and edge deployments threatened by security and connectivity problems
Organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments, according to a Volterra survey of more than 400 IT executives. …

Excel template: Plan and monitor your security spending
The Ultimate Security Budget Plan & Track template is an Excel spreadsheet that comes pre-packaged with the required formulas to continuously measure, on a monthly basis, …

March 2020 Patch Tuesday: Microsoft fixes 115 vulnerabilities, Adobe none
It’s March 2020 Patch Tuesday and Microsoft has dropped fixes for 115 CVE-numbered flaws: 26 are critical, 88 important, and one of moderate severity. The good news is …

Hackers are getting hacked via trojanized hacking tools
Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has …

Hackers are compromising vulnerable ManageEngine Desktop Central instances
Is your organization using ManageEngine Desktop Central? If the answer is yes, make sure you’ve upgraded to version 10.0.474 or risk falling prey to attackers who are …

Why a risk-based approach to application security can bolster your defenses
Like it or not, cybercrime is big business these days. A casual glance at the news at any given time will typically reveal several new breaches, usually involving eye-watering …

What is open threat intelligence and what is driving it?
In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and the …

PPP Daemon flaw opens Linux distros, networking devices to takeover attacks
A vulnerability (CVE-2020-8597) in the Point-to-Point Protocol Daemon (pppd) software, which comes installed on many Linux-based and Unix-like operating systems and networking …

Researchers develop data exchange approach with blockchain-based security features
An IT startup has developed a novel blockchain-based approach for secure linking of databases, called ChainifyDB. “Our software resembles keyhole surgery. With a barely …

eBook: Automating Incident Response
This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve …

Coronavirus-themed scams and attacks intensify
Scammers and other criminals are always quick to take advantage of crises, and this latest – centered around the spread of the deadly Covid-19 coronavirus around the …
Featured news
Resources
Don't miss
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”
- Cyberattacks are changing the game for major sports events
- Can your security stack handle AI that thinks for itself?
- July 2025 Patch Tuesday forecast: Take a break from the grind