Please turn on your JavaScript for this page to function normally.
healthcare
OpenEMR vulnerabilities put patients’ info, medical records at risk

A slew of vulnerabilities in OpenEMR allowed attackers to access random patients’ health records, view data from a target database, escalate their privileges on the …

zero
Where should companies focus as they begin their machine learning journey?

As machine learning has become more widely adopted across industries, O’Reilly set out to learn more about how companies approach this work. By surveying more than 11,000 data …

DevSecOps
Only 8% of orgs have effective DevSecOps practices

92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in …

artificial intelligence
Most IT decision makers believe AI is the silver bullet to cybersecurity challenges

New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …

key
Hashcat developer discovers simpler way to crack WPA2 wireless passwords

While looking for ways to attack the new WPA3 security standard, Hashcat developer Jens “Atom” Steube found a simpler way to capture and crack access credentials …

Bitcoin
Theft of user accounts on cryptocurrency exchanges is soaring

Within a year, the number of data leaks from cryptocurrency exchanges soared by 369%, Group-IB researchers have found, and the US, Russia and China are the countries where …

Android Pie: Security and privacy changes

It is official: “Android P” is Android Pie, and it comes with a variety of new capabilities and security and privacy changes. The newest version (9.0) of the …

employee
Cyber hygiene training is infrequent and inconsistent

Finn Partners Research released findings from its Cybersecurity at Work study that examined the level of cyber risk that employees pose to their organizations. The in-depth …

robot
Researchers open source tools to identify Twitter bots at scale

Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning …

IoT
The FBI warns about compromised IoT devices

The FBI is instructing users on how to recognize when their IoT devices have been compromised and advising them on how to keep them secure. “Compromised devices may be …

HP
HP plugs critical RCE flaws in InkJet printers

HP has plugged two critical vulnerabilities (CVE-2018-5924, CVE-2018-5925) affecting many of its InkJet printers and is urging users to implement the provided firmware updates …

gears
Week in review: Deploying automation securely, dark web activities that indicate a breach

Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools