Please turn on your JavaScript for this page to function normally.
hand
Businesses know breaches are happening, but do they know how, why and when?

Nearly four in five companies (79%) were hit by a breach in the last year, according to Balabit. Their research also revealed that 68% businesses expect to be impacted by …

danger
Phishing, malware, and cryptojacking continue to increase in sophistication

Attackers are constantly trying new ways to get around established defenses. The data, collected throughout 2017 by Webroot, illustrates that attacks such as ransomware are …

cloud
Experiences and attitudes towards cloud-specific security capabilities

Dimensional research conducted a survey of IT professionals responsible for cloud environments. The survey, which is comprised of data collected from over 600 respondents from …

earth
Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud

Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …

hole
Netflix, Dropbox promise not to sue security researchers, with caveats

Netflix and Dropbox have both noted recently that they won’t sue security researchers who find and disclose vulnerabilities in their products. The only caveat is: the …

Atlanta
Atlanta government systems hit by ransomware

The city of Atlanta has suffered a ransomware attack on Thursday, which resulted in outages of some of its customer facing applications, including some that customers may use …

RSAC
RSA Conference 2018 USA: What you can expect at this year’s event

With RSA Conference 2018 USA less than a month away, we asked Britta Glade, Director, Content and Curation for RSA Conference, to tell us more about this year’s event. …

Gemalto ID card
New infosec products of the week​: March 23, 2018

Gemalto unveils enhanced security features for ID documents These security features are available as additional options in the Gemalto Color Laser Shield secure identity …

biohazard
1 in 10 targeted attack groups use malware designed to disrupt

Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and …

axe
Top cybersecurity evasion and exfiltration techniques used by attackers

SS8 released its 2018 Threat Rewind Report, which reveals the top cybersecurity evasion and exfiltration techniques used by attackers and malicious insiders. During the past …

danger
Malware leverages web injects to empty users’ cryptocurrency accounts

Criminals trying to get their hands on victims’ cryptocurrency stashes are trying out various approaches. The latest one includes equipping malware with …

Android apps
Malicious apps in app stores decrease 37 percent

Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools