Please turn on your JavaScript for this page to function normally.
money
Security services and network security still top spending priorities for CISOs in MENA

Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

flame
Leading domain name registrars suffered data breach

Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach. What happened? …

Apple
Apple releases fresh security updates for macOS, iOS

In the last few days, Apple has staggered security updates for many of its products, including the recently unveiled macOS Catalina. Safari, tvOS, iPadOS, iOS, iCloud, iTunes …

Office 365
Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Office 365 users at high-profile companies in a wide variety of industries are being targeted with voicemail-themed phishing emails, McAfee researchers have found. They say …

containers
Container usage has grown in complexity, specific security controls are needed

Container usage has grown in scale and complexity, and doubled in density, according to Sysdig. As container technologies continue to transform how organizations deliver …

hand
Cybercriminals using custom phishing tools to target the world’s largest tech brands

Cybercriminals are using enterprise-based development and deployment strategies, such as phishing as a service (PaaS), to leverage some of the world’s largest tech brands, …

Microsoft Windows
Most IT pros still haven’t migrated all their users to Windows 10

59% of IT professionals report that they still haven’t migrated all their users to Windows 10, despite the imminent end of regular support for Windows 7 on January 14, 2020, …

gamer
As the eSports industry grows, it becomes attractive for financially motivated cybercriminals

Though cybercriminals have been targeting the gaming community since 2010, eSports players, gaming companies, sponsors and viewers will be more at risk over the coming years …

ThreatConnect whitepaper
Whitepaper: Busting the myth that more threat intel feeds lead to better security

It’s a common misconception that a large quantity of threat intelligence feeds leads to more effective security. Unfortunately, threat feed overindulgence can lead to …

G Suite
G Suite admins get context-aware access controls, rule-based automated actions and alerts

Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …

patch
Want to overcome patching challenges once and for all? Automation is the key

The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …

biohazard
The nastiest ransomware, phishing and botnets of 2019

Webroot released its annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools