Please turn on your JavaScript for this page to function normally.
Phishing
Office 365 users: Beware of phishing emails pointing to Office Sway

One of phishers’ preferred methods for fooling both targets and email filters is to use legitimate services to host phishing pages. The latest example of this involves …

find
Companies: Lean into consumer privacy to win

The California Consumer Privacy Act became effective on the first day of 2020 and will affect millions of consumers and tens of thousands of companies. The advent of the CCPA …

patch
January 2020 Patch Tuesday forecast: Let’s start the new decade right

The holidays are over, and another Patch Tuesday is rapidly approaching. My New Year’s resolution was to stop procrastinating when it comes to getting organized. I have …

building
New infosec products of the week: January 10, 2020

Arlo SmartCloud: A SaaS solution securing cloud services for businesses Arlo SmartCloud is a fully managed global platform built for security, scalability and reliability that …

People
What students think about university data security

Only 32% of students agree they are aware of how their institution handles their personal data, compared to 45% who disagree and 22% who neither agree nor disagree, according …

Citrix
Attackers exploiting critical Citrix ADC, Gateway flaw, company yet to release fixes

Nearly a month has passed since Citrix released mitigation measures for CVE-2019-19781, a critical vulnerability affecting Citrix Application Delivery Controller and Citrix …

Firefox
Mozilla patches actively exploited Firefox zero-day

Mozilla has patched a Firefox zero-day vulnerability (CVE-2019-17026) that is being exploited in attacks in the wild and is urging Firefox and Firefox ESR users to update …

IoT
California’s IoT cybersecurity bill: What it gets right and wrong

California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT …

5G
When do you plan to upgrade to 5G?

The smartphone will remain the dominant consumer device into the new decade, but the arrival of 5G will not guarantee a surge in device upgrades, according to a GSMA …

hand
eBook: How Hackers Plan Their Attacks

Being the good guys, we think about how to protect ourselves from cyberattacks. But have you ever tried thinking like hackers planning their next attack? BitDam founders used …

Google Play malware
App on Google Play exploited Android bug to deliver spyware

Google has pulled three malicious apps from Google Play, one of which exploits a recently patched kernel privilege escalation bug in Android (CVE-2019-2215) to install the app …

Travelex
Travelex extorted by ransomware gang, services still offline a week after the hit

On the last day of 2019, foreign exchange company Travelex was hit by cyber attackers wielding the Sodinokibi (aka REvil) ransomware. More than a week later, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools