The FBI expects a surge of mobile banking threats
The increased use of mobile banking apps due to the COVID-19 pandemic is sure to be followed by an increased prevalence of mobile banking threats: fake banking apps and …
                                Magecart attackers hit Claire’s, Intersport web shops
Magecart attackers have compromised web shops belonging to large retail chains Claire’s and Intersport and equipped them with payment card skimmers. Claire’s The …
                                (IN)SECURE Magazine issue 66 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 66 has been released today. It’s a free …
                                Three years after WannaCry, what have we learned?
Three years ago, the WannaCry ransomware worm wreaked havoc on hundreds of thousands of organizations worldwide, ranging from hospitals that had to pause urgent operations to …
                                Can we safeguard the election infrastructure from cyber attacks?
70 percent of security professionals believe their local governments cannot adequately safeguard the election infrastructure against domestic and international cyber attacks. …
                                Complexity and size of DDoS attacks have increased
The complexity and size of DDoS attacks in 2019 has increased significantly compared to 2018. A report published by NaWas by NBIP concludes that despite the number of attacks …
                                The impact of SD-WAN for securing public cloud adoption
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats …
                                There is a direct correlation between AI adoption and superior business outcomes
Adoption of artificial intelligence (AI) is growing worldwide, according to an IDC survey of more than 2,000 IT and line of business (LoB) decision makers. Over a quarter of …
                                Week in review: SMBGhost exploit, OneDrive security, PCI compliance misconceptions
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Organizations are creating the perfect storm by not implementing security …
                                Why DevSecOps remains a mirage
Despite the rhetoric around DevSecOps, security remains an afterthought when organizations are building software. Meanwhile, the latest Verizon threat report identified that …
                                Your greatest work from home lifeline is also your newest attack vector
Enterprises have been experimenting with work from home policies for years. Unfortunately, that experiment suddenly became the default this spring as local and state …
                                New infosec products of the week: June 12, 2020
Qualys Remote Endpoint Protection gets malware detection, free for 60 days Powered by the Qualys Platform and Cloud Agent, malware detection in Remote Endpoint Protection uses …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military