Please turn on your JavaScript for this page to function normally.
mask
Fraudster exploited US govt staff info stolen in 2015 OPM breach

The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the …

person
Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

Internet of Things
Global IoT tech spending to reach $1.2 trillion in 2022

IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is …

dark
French authorities dismantle Black Hand dark web market

The “Black Hand” forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. …

(IN)SECURE Magazine 58
(IN)SECURE Magazine issue 58 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is …

money
F-Secure acquires MWR InfoSecurity

F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in …

storm
Week in review: Digital signature spoofing, securing microservices

Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …

GnuPG
Vulnerability in GnuPG allowed digital signature spoofing for decades

A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected …

Cybric dashboard
New infosec products of the week​: June 15, 2018

Container security from dev to production Sysdig released Sysdig Secure 2.0, that enables enterprises to secure containers and microservices. The latest version adds …

users
Exploring the maturity of corporate security awareness programs

Cyber security awareness programs are beginning to gain ground among businesses, but many of the professionals responsible for their implementation are challenged by a lack of …

mobile worker
The challenges of securing mobile workers and keeping data secure

Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in …

Lock
New trends advance user privacy

Privacy and security online are one of the top concerns of Americans, especially after numerous massive data breaches (Equifax, Yahoo, Uber) that happened in the past couple …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools