Please turn on your JavaScript for this page to function normally.
email
Critical Exim flaw opens servers to remote code execution, patch now!

The Exim mail transfer agent (MTA) is impacted by a critical vulnerability that may allow local or unauthenticated remote attackers to execute programs with root privileges on …

sale
Cybersecurity issues can’t be solved by simply buying a product

Year after year, data breach losses continue to rise and the cybercrime economy continues to thrive. What is the cybersecurity industry doing wrong? Vendors must genuinely …

secure
SMBs show no improvement in IT maturity levels, security remains top concern

IT groups at small and midsize businesses (SMBs) show no improvement in IT maturity levels in three years, while security remains top concern, a Kaseya survey reveals. Based …

privacy
Should social media organizations be subject to strict privacy regulation?

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, …

vote
Bots evolving to better mimic humans during elections

Bots or fake accounts enabled by artificial intelligence on social media have evolved and are now better able to copy human behaviors in order to avoid detection, according to …

5G
The global impact of 5G technologies

A white paper produced by Rysavy Research and 5G Americas technical experts explores the intensifying role of wireless communications, the evolution of its technology, …

CISSP Practice Tests
Mini eBook: CISSP Practice Tests

Download the mini eBook for a sneak peek into the Official (ISC)² CISSP Practice Tests book. Inside you’ll find: 50 CISSP practice test items and answers to gauge your …

abstract
Week in review: Supply chain security, Android flaw opens users to advanced SMS phishing

Here’s an overview of some of last week’s most interesting news, articles and podcasts: How to reduce the attack surface associated with medical devices As the …

Google
Google’s differential privacy library can now be used by anyone

Google has open-sourced a differential privacy library that helps power some of its core products. What it differential privacy? Differential privacy is a method for analyzing …

patch
September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash …

laptop
New infosec products of the week: September 6, 2019

Trustwave launches Trustwave Fusion, a new cloud-based cybersecurity platform The Trustwave Fusion platform connects the digital footprints of enterprises and government …

money
Most citizens are against local governments paying ransomware attackers

Nearly 80% of US citizens are increasingly worried about ransomware attacks on cities – yet more than half are still hesitant to have city governments put forth the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools