Please turn on your JavaScript for this page to function normally.
keyboard
New user keystroke impersonation attack uses AI to evade detection

A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …

Magento
Most e-commerce websites running Magento at high risk of cybercrime

New research has found 87% of SME websites using the Magento platform are currently at high risk from cyber attacks. By contrast, under 10% of websites using other major …

DevSecOps
There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Retailers are putting their customer’s data at risk by failing to incorporate proper security controls in their new application development practices, according to the latest …

arrows
Week in review: Critical Exim flaw, weaponized cars, June Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news and articles: Apple debuts privacy-minded “Sign in with Apple” SSO Apple’s new single sign-on (SSO) …

iPhone
Two-thirds of iOS apps don’t use App Transport Security

Most iOS apps don’t take advantage of App Transport Security​ (ATS), a networking security feature offered by Apple that ensures encrypted connections between apps and …

patch
June Patch Tuesday forecast: Apply updates before BlueKeep hits the streets

Can you believe it is June already? Summer is rapidly approaching, but it’s been slow to warm up our temperatures here in the US. I can’t say the same thing about the …

email
Critical Exim flaw exploitable locally and remotely, patch ASAP!

A critical vulnerability in Exim, the mail transfer agent (MTA) deployed on over half of all Internet-facing mail servers, may allow attackers to run commands as the …

snake
Criminals are selling hacking services targeting world’s biggest companies

A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand …

DDoS
Global communications service providers struggling to fend off growing number of DDoS attacks

Global communications service providers, whose businesses are predicated on continuous availability and reliable service levels, are struggling to fend off a growing number of …

industry
Industrial cybersecurity strategies need a radical rethink and should be built from the ground up

The paradigm shift brought forth by Industry 4.0 and the Industrial Internet of Things (IIoT) is significantly enhancing the digital and connectivity capabilities of …

reload
Poor data management can cost organizations $20 million each year

Over the past decade, the amount of data generated has exploded; data growth and sprawl is so rampant that by 2025 we will generate more than 175 Zettabytes of data each year, …

Workforce diversity key to plugging the IT skills gap

An (ISC)2 study of employees in 1,000 organizations in the U.K. and 250 in the Netherlands reveals that workplace diversity in IT and security has become a key operational …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools