Please turn on your JavaScript for this page to function normally.
Waterfall Security Solutions
Podcast – Malcolm, a new tool for network visibility

Jens Wiesner of the German BSI explores Malcolm, a new (free, open source) tool for OT network visibility, brought to us by the U.S. Idaho National Labs (INL). This podcast is …

G Suite
Google introduces new G Suite security options

Google has introduced new security options for G Suite customers, including Advanced Protection for enterprise users and access control for apps accessing G Suite data. …

Monero
Monero Project site compromised, served malware-infected binaries

The official website of the Monero Project has been compromised to serve a malware-infected version of the CLI (command-line interface) wallet. The malicious file was …

woman
Women in cybersecurity can benefit from taking inventory of their personal apps

Today, technology fits into the palm of our hand. We have become accustomed to turning to it to find all sorts of answers to everyday challenges such as where to eat, where to …

IoT
California IoT security law: What it means and why it matters

In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months …

medical
1.19 billion confidential medical images available on the internet

1.19 billion confidential medical images are now freely available on the internet, according to Greenbone’s research into the security of Picture Archiving and …

snake
Only 11% of organizations can detect intruders in under one minute

The process of detecting, triaging, investigating, and containing a cyber incident takes organizations globally on average nearly seven days of working around the clock …

DDoS
Attackers increasingly embrace small-scale DDoS attacks to evade detection

The growth in both large- and small-scale DDoS attacks continues its upward trajectory, according to a report released by Neustar. The report reveals that the total number of …

Cynet template
Template: Assess the performance of your security team

Assessing the performance of your security team is critical to knowing your current posture, as well as planning ahead. The Ultimate 2019 Security Team Assessment Template …

Checkmarx research
Android camera apps could be hijacked to spy on users

A vulnerability in the Google Camera app may have allowed attackers to surreptitiously take pictures and record videos even if the phone is locked or the screen is off, …

online shop owned
Macy’s online store compromised in Magecart-style attack

The webshop of noted U.S. department store company Macy’s has been compromised and equipped with an information-stealing JavaScript, which ended up collecting …

virtual reality
Want to build a successful SOC? Here’s what you need to know

There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools