
Companies still struggle to detect IoT device breaches
Only 48% of businesses can detect if any of their IoT devices suffers a breach, according to Gemalto. This comes despite companies having an increased focus on IoT security: …

Radio frequency remote controller weaknesses have serious safety implications
Trend Micro released a new report detailing inherent flaws and new vulnerabilities in radio frequency (RF) remote controllers found and disclosed through the Zero Day …

Widely used building access system can be easily compromised
A researcher has discovered several egregious vulnerabilities in the PremiSys IDenticard building access management system, some of which could allow attackers to take control …

Hack a Tesla Model 3, get cash and the car
For this year’s edition of the Pwn2Own hacking contest at CanSecWest, Trend Micro’s Zero Day Initiative has announced a new target category: Automotive. So, aside from …

A new taxonomy for SCADA attacks
Attacks aimed at SCADA networks are still much rarer than those targeting IT networks, but the number is slowly rising. And, according to Radiflow CTO Yehonatan Kfir, …

How to build a better CISO
The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer …

Criminals wielding Ryuk ransomware specialize in targeting enterprises
A cybercriminal group dubbed Grim Spider has been using the Ryuk ransomware to exclusively target enterprises and has managed to amass over 705 Bitcoins (around $3.7 million) …

43% of businesses are still running Windows 7, security threats remain
With one year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform. …

90% of companies face significant obstacles with digital transformation
Nearly eight in 10 (79 percent) companies are in the process of digital transformation, but the vast majority, 90 percent, are facing significant obstacles to success. The new …

SmokeLoader malware downloader enters list of most wanted malware
Check Point has published its latest Global Threat Index for December 2018. The index reveals that SmokeLoader, a second-stage downloader known to researchers since 2011, rose …

Hackers who DDoSed African telecom and US hospital get long prison sentences
Two men who launched DDoS attacks against a variety of targets have received substantial prison sentences on Friday. Attacks against Liberian telecom 30-year-old Daniel Kaye …

Considering an SD-WAN deployment? The best solution may already be in your network
When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …
Featured news
Resources
Don't miss
- PoC exploit for SysAid pre-auth RCE released, upgrade quickly!
- Actively exploited FreeType flaw fixed in Android (CVE-2025-27363)
- Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable
- Rethinking AppSec: How DevOps, containers, and serverless are changing the rules
- Autorize: Burp Suite extension for automatic authorization enforcement detection