Please turn on your JavaScript for this page to function normally.
quantum
Enterprises are blind to over half of malware sent to their employees

As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible …

question
Businesses need to rethink security priorities due to shifting trends

One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup …

businessman
Half of business leaders say a breach could end their business, others remain unaware

A majority (58 percent) of executives at SMBs are more concerned about suffering a major data breach than a flood, a fire, a transit strike or even a physical break-in of …

danger
40% of malicious URLs were found on good domains

While tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals, according to the 2019 Webroot Threat …

connection
By 2025 workforce most likely to consist of humans and bots

The workforce, workplace, and the technologies that support them will be so different by 2025 that enterprises need to provide global access and ensure continuous uptime now. …

vote
ENISA provides recommendations to improve the cybersecurity of EU electoral processes

In the context of the upcoming elections for the European Parliament, the EU Agency for Cybersecurity ENISA published an opinion paper on the cybersecurity of elections and …

businessman
Phishing, software supply chain attacks greatest threats for businesses

Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more …

cisco small business router
Cisco SOHO wireless VPN firewalls and routers open to attack

Cisco has released security fixes for several models of wireless VPN firewalls and routers, plugging a remote code execution flaw (CVE-2019-1663) that can be triggered via a …

Akamai report
Fighting credential stuffing attacks is an uphill battle

Hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year, making retail the most targeted segment studied, …

cloud
Cloud business initiatives accelerating faster than security teams’ ability to secure them

The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 …

Netscout
Attackers continue to enhance their performance, apply smart business techniques

During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate …

keys
Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools